We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Data Diode.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Data Diode - List of Manufacturers, Suppliers, Companies and Products

Data Diode Product List

1~6 item / All 6 items

Displayed results

OWCD Remote Secure Link File Sharing

There are ways to obtain information in a file-based manner within the supply chain. Even with partners at a low level of responsiveness, we can strengthen our collaboration.

A data diode that restricts communication direction to one-way. Among them, the physical data diode "OWCD" truly cuts off the line in one direction. By skillfully combining this in the network configuration, we can create a network that protects the supply chain. While the internet can be used in various ways, the critical systems can shut out unauthorized intrusions from the source and prevent information leaks on the receiving side. Isn't it still common to attach PDF files to emails and send them to others? Even in situations where emails are simply accepted, using OWCD to prevent leaks from that circuit is recommended. In the case of sending and receiving invoices in the supply chain, placing OWCD on both sides can strengthen the defenses even more. If two-way communication is necessary, it can be accommodated by setting up both ends. The use of OWCD is increasingly being utilized by SIers in their proposals to customers. Please make use of it. For inquiries, please visit our company website through the related link below.

  • Firewall and intrusion prevention
  • filtering
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Defense Solution: Data Diode

Completely block external hacking! Essential for organizations that handle various confidential data!

Fox-IT's "Data Diode" complies with the North American Electric Reliability Corporation's critical infrastructure protection cybersecurity standards and has received numerous certifications, including NATO SECRET level and the "green scheme," earning trust from international organizations and governments worldwide. It provides complete protection against confidential data leaks that cannot be prevented by traditional firewalls, IPS, or UTM. By converting bidirectional IP communication into unidirectional communication "at the hardware (physical layer)," it completely blocks hacking from external sources. It has received security certification under CC (Common Criteria) EAL 7+ and has already built a strong track record in preventing confidential data leaks in over 40 countries. 【Features】 ■ Complete protection against confidential data leaks that cannot be prevented by traditional firewalls, IPS, or UTM ■ Guarantees unidirectional communication through simple hardware ■ Certified for security under CC EAL 7+ ■ Completely blocks external hacking by converting to unidirectional communication at the hardware (physical layer) *For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Other network tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Fox-IT's "DATADIODE"

Safe for important facilities! Physically block cyber attacks and protect industrial control systems!

"DATADIODE" is a high-security network device recommended for industrial control systems (ICS) in Europe and the United States. Utilizing the characteristic of one-way communication of a diode, it physically restricts intrusions into ICS at the physical level. It provides a physically one-way communication environment for areas requiring high security, preventing cyber attacks and information leaks. Showden offers "FoxDataDiode," which complies with particularly strict examination standards among data diodes, from installation to maintenance. 【Features】 - Internal structure that realizes physical one-way communication (OneWay) - Prevents cyber attacks and information leaks - No need for maintenance of security such as updating pattern files - Hardware-based (Layer 1) network security solution - Obtained world-class security certification For more details, please refer to the catalog or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

OWCD活用ハイセキュリティ事例:リモートデスクトップ 

セキュアなリモートメインテナンス回路を使って安全安心に

データダイオードは一方向に通信を制御する装置ですから、双方向通信はできません。 しかし、発信元側の不正侵入防止としては万全の装置ですから、なんとか双方向に使えないか・・・ お客様からそういう声をよく頂戴します。 そこでシチュエーションごとに「コレでいかが」という使い方の一つをご紹介します。 OWCD活用ハイセキュリティ事例:「リモートデスクトップ」です。 Windowsのサービスである「リモートデスクトップ」で使われる通信の中身を分け、各々別のルートで流し、そこにOWCDを入れることで、発信源側への不正アクセス・侵入を防ぎます。 お客様独自のゼロトラストセキュリティシステム等との組み合わせもできます。SIer様からのご相談もお待ちしています。 お問い合わせは、下記⤵弊社ホームページ内の「お問い合わせ」から どうぞ

  • Firewall and intrusion prevention
  • Other network tools
  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Remote Secure Link: How to Use it in the Supply Chain

There are ways to securely obtain information within the supply chain. Even with partners who have a low level of responsiveness, you can strengthen the relationship.

A data diode that restricts communication direction to one way, specifically the physical data diode "OWCD" that truly cuts the line in one direction. By skillfully combining this in the network configuration, we can create a network that protects the supply chain. While the internet can be used in various ways, the crucial systems can: - Shut out unauthorized intrusions from the source - Shut out information leaks from the receiving side. Even if the security management levels and malware countermeasures differ between the companies communicating, it is possible to clarify the points of responsibility and build each company's internal network. It can be used for various purposes, including understanding production status and collecting data for remote monitoring. The OWCD is increasingly being utilized by SIers in their proposals to customers. Please make use of it. For inquiries, please visit our company website through the link below.

  • Firewall and intrusion prevention
  • Other information systems
  • filtering

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

How to prevent file information leakage using a data diode OWCD.

The increase in business shutdowns and ransom demands due to ransomware infections is on the rise. As IT advances, the risks also increase. A blind spot is the leakage of file information. Let's protect ourselves.

Data diodes are devices that restrict communication in one direction and are effective in preventing unauthorized intrusions. However, is that enough for security measures? Is it really so? Ultimately, there are security holes somewhere that can be exploited, leading to intrusions, requiring days to restart the system and restore data, during which business operations come to a halt. OWCD provides hassle-free boundary control, but did you know there are actually two ways to use it? One is to protect the core without allowing intrusions. The other is to ensure that "nothing goes out," preventing the actual harm of information leakage. In most cases, simply achieving the goal by intruding is not enough. Once an intrusion occurs, the attacker can scout the target's system, penetrate to critical areas, encrypt contents, extract files, or send emails, resulting in real damage. These actions require the virus itself to communicate with external malicious intruders and be remotely controlled. If that operational communication cannot occur, even if an intrusion happens, the worst-case scenario has not yet materialized, allowing time to detect even unknown viruses. Depending on how it is used, defenses can be strengthened. Please consider this. For inquiries, please visit our company website linked below ⤵. There is also a video explanation!

  • Firewall and intrusion prevention
  • Other security
  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration