How to prevent file information leakage using a data diode OWCD.
Data Diode OWCD Series
The increase in business shutdowns and ransom demands due to ransomware infections is on the rise. As IT advances, the risks also increase. A blind spot is the leakage of file information. Let's protect ourselves.
Data diodes are devices that restrict communication in one direction and are effective in preventing unauthorized intrusions. However, is that enough for security measures? Is it really so? Ultimately, there are security holes somewhere that can be exploited, leading to intrusions, requiring days to restart the system and restore data, during which business operations come to a halt. OWCD provides hassle-free boundary control, but did you know there are actually two ways to use it? One is to protect the core without allowing intrusions. The other is to ensure that "nothing goes out," preventing the actual harm of information leakage. In most cases, simply achieving the goal by intruding is not enough. Once an intrusion occurs, the attacker can scout the target's system, penetrate to critical areas, encrypt contents, extract files, or send emails, resulting in real damage. These actions require the virus itself to communicate with external malicious intruders and be remotely controlled. If that operational communication cannot occur, even if an intrusion happens, the worst-case scenario has not yet materialized, allowing time to detect even unknown viruses. Depending on how it is used, defenses can be strengthened. Please consider this. For inquiries, please visit our company website linked below ⤵. There is also a video explanation!
Inquire About This Product
basic information
One of the commonly cited intrusion routes is email. A virus is embedded in an email attachment, and when it is opened, it infects the system. Therefore, we place an OWCD (One-Way Communication Device) along the email arrival route to restrict communication to only incoming traffic. The virus sends information about the route it has taken back to the remote operator. If this is blocked by the OWCD, it cannot reach the core information. Naturally, the leakage of sensitive information is also impossible. By separating the email transmission route, performing virus checks on attachments, and using it alongside ransomware countermeasures, security can be dramatically improved. Even with the same boundary control, software settings like firewalls can lead to mistakes or oversights. Each time personnel or systems change, and each time a virus patch is released, maintenance of settings is required, making it difficult to predict when errors might occur... management and costs become quite challenging. The OWCD is designed to limit communication to one direction, preventing backflow. It is being adopted one after another, especially in critical infrastructures such as government agencies, power plants, transportation systems, and various research laboratories where even the slightest risk is unacceptable. For more information, please contact us through our company website.
Price information
There are variations depending on the communication bandwidth. We also accept system engineering for implementation (scope, cost, and delivery time are negotiable). Please contact us through our company website for the above.
Price range
P5
Delivery Time
※We are engaged in made-to-order production. Please contact us through our company website mentioned above.
Applications/Examples of results
Government agency information systems (communication backflow control for external email reception checks) Traffic information systems (one-way communication control from the control system to the public web server) Remote monitoring systems for industrial equipment (intrusion prevention at the data transmission unit) Supply chain information collection systems in the industrial sector (prevention of unauthorized access to production facilities and unauthorized data extraction at the collection side) Core information management systems in research institutes (prevention of intrusion into research facilities and unauthorized data extraction from data servers) As mentioned above, these systems are utilized in government agencies, power plants, defense systems, manufacturers' research institutes, and production information transmission points. For inquiries, please contact us through our company website.
catalog(8)
Download All CatalogsCompany information
Our company is a member of the Mitsubishi Heavy Industries Group, serving as a design technology partner for Mitsubishi Heavy Industries, where we engage in planning and mechanical design for prime movers (steam turbines/boilers, gas turbines, water turbines), pumps, and various plants, as well as instrumentation control system planning and electrical design. In order to meet the increasingly diverse and sophisticated needs of our customers, we will continue to challenge ourselves to improve our technological capabilities, streamline operations, and reduce costs based on the trust we have built with users. Through this, we are developing activities that contribute to society by providing the products and engineering capabilities we have cultivated so far to everyone. Alongside the sale of products related to IoT, manufacturing DX, and on-site monitoring/condition monitoring, we will focus on custom orders, customization, and system construction to realize your ideas. We encourage you to consider utilizing our services. https://eng.power.mhi.com






