How to prevent file information leakage using a data diode OWCD.
Data Diode OWCD Series
Ransomware damage is increasing, and the risks are growing. If breached, only a handful succeed in preventing data leakage. Are you implementing measures to prevent data exfiltration?
Zero Trust Security: Did you know that it has actually been infiltrated quite a while ago? If targeted, half of passwords are broken, allowing for blatant intrusions, and 80% of the unauthorized signals that are noticed later do not trigger alarms. At this point, the probability of a bad move failing is only a few percent. It’s a free-for-all... OWCD provides hassle-free boundary control, but did you know there are actually two ways to use it? One is to protect the core without allowing intrusion. The other is to ensure that "nothing is leaked," thereby avoiding actual harm to resilience. There are hardly any cases where simply achieving the goal by infiltrating the opponent suffices. If an intrusion occurs, it allows for reconnaissance of the opponent's system, penetrating critical areas, encrypting contents to halt operations, extracting confidential information, or continuously sending malicious emails... these are the actual harms. For this to happen, the virus itself must communicate with external malicious intruders and be remotely controlled. If that communication cannot occur, even if an intrusion happens, no actual harm has yet occurred, allowing time to detect and eliminate even unknown viruses. Cybersecurity: The way you use OWCD can strengthen your defenses. Please consider it. For inquiries, please refer to the related links below.
Inquire About This Product
basic information
One of the commonly cited intrusion routes is email. Viruses are embedded in email attachments, and when opened, they cause infections. Therefore, we place an OWCD (One-Way Communication Device) along the email arrival route to restrict communication to only incoming traffic. Malware sends information about the route it has taken and the data it has accessed to a remote operator. By blocking this with the OWCD, it cannot reach core information. Naturally, the leakage of sensitive information is also impossible. By utilizing it alongside measures against ransomware, such as separating the email sending route and performing virus checks on attachments, security will be significantly enhanced. Even with the same boundary control, software settings like firewalls can lead to mistakes or oversights. Each time personnel or systems change, and each time a virus protection patch is released, maintenance of settings is required, making it difficult to predict when errors might occur... management and costs become quite challenging. The OWCD is a system that limits communication to one direction and prevents backflow. It is being adopted successively in critical infrastructures such as government agencies, power plants, transportation systems, and various research laboratories, where even the slightest risk is unacceptable. For more information, please contact us through our company website.
Price information
There are variations depending on the communication bandwidth. We also accept system engineering for implementation (scope, cost, and delivery time are negotiable). It may seem that there is a significant initial investment, but please compare the introduction of OWCD with the loss of revenue due to business interruptions. In the past, virus infections would typically stop a few PCs, but now they can suddenly wipe out everything. Compared to the cost of implementing multi-layered defenses, the losses for your company could be immeasurable. For inquiries, please contact us through our company website.
Price range
P5
Delivery Time
※We are engaged in made-to-order production. Please contact us through our company website mentioned above.
Applications/Examples of results
Government Agency Information Systems (Communication backflow control in external email reception checks) Traffic Information Systems (One-way communication control from the control system to the public web server) Remote Monitoring Systems for Industrial Equipment (Intrusion prevention at the data transmission unit) Supply Chain Information Collection Systems in the Industry (Prevention of unauthorized access to production facilities and unauthorized data extraction on the collection side) Core Information Management Systems in Research Institutes (Prevention of intrusion into research facilities and unauthorized data extraction from data servers) As mentioned above, these systems are utilized in government agencies, power plants, defense systems, manufacturers' research institutes, and production information transmission points. Various systems exist both inside and outside the company, and efforts are being made to connect them organically to improve productivity. It seems that only large enterprises at the top of the supply chain have been concerned about this until now, but the target has now expanded to include medium-sized and small enterprises, as well as independent-minded companies that do not consider themselves part of the supply chain. There is no guarantee that your company is not being targeted. We are seeing an increase in inquiries and implementations from companies and organizations that are aware that they are "being targeted!" For inquiries, please contact us through our company website above.
catalog(8)
Download All CatalogsCompany information
Our company is a member of the Mitsubishi Heavy Industries Group, serving as a design technology partner for Mitsubishi Heavy Industries, where we engage in planning and mechanical design for prime movers (steam turbines/boilers, gas turbines, water turbines), pumps, and various plants, as well as instrumentation control system planning and electrical design. In order to meet the increasingly diverse and sophisticated needs of our customers, we will continue to challenge ourselves to improve our technological capabilities, streamline operations, and reduce costs based on the trust we have built with users. Through this, we are developing activities that contribute to society by providing the products and engineering capabilities we have cultivated so far to everyone. Alongside the sale of products related to IoT, manufacturing DX, and on-site monitoring/condition monitoring, we will focus on custom orders, customization, and system construction to realize your ideas. We encourage you to consider utilizing our services. https://eng.power.mhi.com






