How to prevent information leakage using a data diode OWCD.
Data Diode OWCD Series
The number of business shutdowns and ransom demands due to ransomware infections is increasing. As IT adoption progresses, the risks also grow. Don't forget to implement effective data leakage countermeasures.
Data diodes are devices that restrict communication in one direction and are effective in preventing unauthorized intrusions. However, are they truly foolproof security measures? Is that really the case? In the end, there are always security holes somewhere that can be exploited, leading to intrusions, system restarts, and days spent recovering data, during which medical services come to a halt—this has often made the news, hasn't it? OWCD provides hassle-free boundary control, but did you know there are actually two ways to use it? One is to protect the core without allowing intrusions. The other is to ensure that "nothing goes out," thus preventing the actual harm of information leaks. There are very few cases where simply gaining access to a system achieves the goal. If an intruder gets in, they will scout the system and penetrate to critical areas, encrypting or exfiltrating data, which results in actual harm. To do this, the virus itself must communicate with external malicious intruders and be remotely controlled. If that communication cannot happen, even if an intrusion occurs, the worst-case scenario has not yet materialized, allowing time to detect even unknown viruses. Depending on how it is used, defenses can be strengthened. Please consider this. For inquiries, please visit our company website linked below ⤵. There are also video explanations available!
Inquire About This Product
basic information
One of the commonly cited intrusion routes is email. By embedding a virus in an email attachment and getting the recipient to open it, infection occurs. Therefore, we place an OWCD (One-Way Communication Device) on the incoming side of the email route to restrict communication. The virus sends information about the route it has taken to a remote operator. If this is blocked by the OWCD, it cannot reach the core information. Naturally, the leakage of core information is also impossible. By using it in addition to general ransomware countermeasures such as separating the email transmission route and performing virus checks on attachments, security measures can be significantly improved. Even with the same boundary control, software settings like firewalls can lead to mistakes or oversights. Each time personnel or systems change, and each time a virus patch is released, maintenance of settings is required, which raises the question of when mistakes might occur... management and costs become quite burdensome. The OWCD is a mechanism that limits communication to one direction on an electronic circuit and prevents backflow. It is being adopted one after another by government agencies, power plants, transportation systems, and other critical infrastructure where even the slightest risk is unacceptable, as well as various research institutions.
Price information
There are variations depending on the communication bandwidth. We also accept system engineering for implementation (scope, cost, and delivery time are negotiable). Please contact us through our company website mentioned above.
Price range
P5
Delivery Time
※We are engaged in made-to-order production. Please contact us through our company website mentioned above.
Applications/Examples of results
Government agency information systems (communication backflow control for external email reception checks) Traffic information systems (one-way communication control from the control system to the public web server) Remote monitoring systems for industrial equipment (intrusion prevention at the data transmission unit) Supply chain information collection systems in the industrial sector (prevention of unauthorized access to production facilities and unauthorized data extraction at the collection side) Core information management systems in research institutes (prevention of intrusion into research facilities and unauthorized data extraction from data servers) As mentioned above, these systems are utilized in government agencies, power plants, defense systems, manufacturers' research institutes, and production information transmission points. For inquiries, please contact us through our company website.
catalog(8)
Download All CatalogsCompany information
Our company is a member of the Mitsubishi Heavy Industries Group, serving as a design technology partner for Mitsubishi Heavy Industries, where we engage in planning and mechanical design for prime movers (steam turbines/boilers, gas turbines, water turbines), pumps, and various plants, as well as instrumentation control system planning and electrical design. In order to meet the increasingly diverse and sophisticated needs of our customers, we will continue to challenge ourselves to improve our technological capabilities, streamline operations, and reduce costs based on the trust we have built with users. Through this, we are developing activities that contribute to society by providing the products and engineering capabilities we have cultivated so far to everyone. Alongside the sale of products related to IoT, manufacturing DX, and on-site monitoring/condition monitoring, we will focus on custom orders, customization, and system construction to realize your ideas. We encourage you to consider utilizing our services. https://eng.power.mhi.com