top of page

Use Cases

Protecting Your Data and Your Networks

Clear Desk Policy
Clear Desk.png

Clear Desk Policy

You wouldn’t leave paperwork on your desk that you don’t want others to see when your away, so why do the same with your computer data?

Computer networks hold all manner of information which should remain confidential however computer networks are online and connected 24/7 even when they are not needed to be. Having data online and available at all times increases the risk of attack.

Hackers target weekends and evenings as this gives them the most amount of time to achieve their aims with the least amount of chance of the hack being detected and stopped in time.

Disconnecting a network when not required can reduce the chance of a successful attack up to 75%.

Our products can make your data disappear from your networks during the hours when it is not required, making the data unobtainable to the most determined and capable hackers including state actors.

In the event that data is required during these hours temporary override is available.

The Air Gap Network Switch can be installed and configured in minutes and can protect up to 7 network devices concurrently.

Cyber Essentials
cyber_security_globe_internet_protection_icon_inverted.png

Cyber Essentials

Cyber Essentials is a set of guidelines for companies to follow to provide assurance to their customers that the products they produce or the data they hold is not attacked or manipulated by malicious actors. The nature of the work provided by companies who are required to comply with Cyber Essentials means that these companies are liable to be targets of highly capable adversaries including state funded actors.

The increasing need to maintain unsupported software or hardware is a headache for such companies. The requirement to disconnect these unsupported aspects whilst still being operational and to create useful data creates a dilemma.

The Air Gap Network Switch provides a convenient solution by allowing all such un-supported devices to be hidden behind an air gap except for the infrequency occasions when these devices are required to be connected to the wider network.

The Air Gap Network Switch can isolate up to 7 legacy devices and each be disconnected from each other to create a highly partitioned network for the control of these legacy devices.

Installable in minutes the Air Gap Network Switch and with the simple local GUI the Air Gap Network Switch can create the separation required to achieve cyber essentials yet offer the flexibility to support legacy computer products on your networks.

Insider Attack.png

Insider Attack

You wouldn’t leave paperwork on your desk that you don’t want others to see when your away, so why do the same with your computer data?

Computer networks hold all manner of information which should remain confidential however computer networks are online and connected 24/7 even when they are not needed to be. Having data online at all times increases the risk of attack.

A common approach that a hacker may utilise to obtain data is to enter a network via an otherwise authorised unscrupulous employee who may have physical access to a building housing a computer network including out of standard office working hours.

It requires just one bad apple who maybe given inside access to premises to be able to access as much of your sensitive data as they can access in the time available to them. This information maybe sufficient to allow a further attack to occur on your network at a later date.

In the event that data is required outside standard hours the Air Gap Network Switch has the option to temporarily disconnect or connect specific devices for this time as is required.

The Air Gap Network Switch removes computer devices such a network storage devices from your network to decrease the chance of this activity taking place.

Easy to install and simple to configure in minutes the Air Gap Network Switch can control up
to 7 network devices concurrently.

Insider Attack
Dissconnect.png

Emergency Disconnect

Most computer networks connect to the wider internet via a single point, often a router or a modem.
A firewall is designed to stop malicious attacker from gaining access to your network however firewalls are often breached through methods which are commonly understood.

This single point of entry to a network can be disconnected, in an emergency, to stop an attacker having access to your network.

There are two methods in which the Air Gap Network Switch can be used in this case:

1) The Air Gap Network Switch as the known and dedicated disconnect device offers an instantly operable disconnect device.

The simple to install device and local simple to use GUI interface can disconnect your network from the wider internet almost instantly removing access to hackers there and then.

2) One or more Air Gap Network Switches can be placed strategically within a network to protect crucial hardware, such as network storage devices with high value data or other high value targets.

Emergency Disconnect
Protect Backups.png

Protect Backups

Computer networks should have a backup policy to allow networks to be re established if the computer network suffers a catastrophic data loss, however the back up is of no use if the data on it is destroyed.

Computer hackers performing a ransomware attack will attempt to find all sources of information on your network to encrypt or destroy it, if they find a back up this will be subject to attack as well.

Back up devices permanently connected to your network are a liability, the Air Gap Backup automates the disconnection and puts redundancy into the back up regime. Backing up your data to up to 7 different backup devices ensures your data is not just secure when backed up but provides multiple backups to restore your network from.

The highly flexible sequencer allows backups to be configured by day and to multiple back up devices.

Easy to install and simple to configure in minutes the Air Gap Backup can enhance your network resilience to the threat of Ransom ware attacks or to network hardware failures.

Protect Backups
Data Theft.png

Data Theft

Having data such as customer data off your network when not required stops your customer data from being a target during these times.

Hackers target customer data to use either as part of a ransomware attack or to use customer data to target customers as part of a follow up attack.

Regulators look at actions that companies take to avoid such hacks. Using the Air Gap Network Switch can display to regulators your commitment the security of customer data.

Data Theft
bottom of page