There won't be any leaks from the OWCD data backup, right?
Data Diode OWCD Series
Is there any possibility that the backup storage data could be leaked? It's also important to have a system in place that prevents data from being stolen.
Ransomware encryption and information leaks are occurring one after another. The intrusion routes are diverse, including email, web, social media, and VPN devices, and as the use of generative AI increases, so does the risk. Once breached, recovery can take days, during which business operations may come to a halt. Therefore, a multi-layered backup that combines online and offline methods is essential. Ransomware does not achieve its goals merely by infiltrating. The real damage occurs when it conducts reconnaissance internally, infiltrates critical areas, and compromises the company's credibility through data encryption or exfiltration. Attackers need to maintain communication from the point of intrusion to their location for remote control, so if this can be interrupted, it can prevent the worst-case scenario and secure time for detection and eradication. The data diode "OWCD" physically restricts communication to one direction only, allowing for this signal to be blocked. Backups are the most critical assets to protect, and when they are accessible externally, they become prime targets for attackers. By blocking unnecessary communication routes, large-scale damage can be avoided. The level of defense can be significantly enhanced depending on how the system is set up. Please consider this. For inquiries, please visit the related link below ⤵ There is also an explanatory video.
Inquire About This Product
basic information
Place the OWCD on the data arrival route and control it so that communication can only occur in the "incoming" direction. Viruses send their location information and data for value judgment to external sources via remote operators, but if that communication is blocked by the OWCD, no further data will be sent out. Of course, this also prevents the leakage of important information. The OWCD has a special structure that allows communication signals to flow in only one direction. In this application, it is restricted to "incoming" only, blocking external leakage. At first glance, the arrival side may seem defenseless. However, the OWCD cannot pass general office communications (TCP/IP), and by utilizing this characteristic, it is easy to perform filtering during protocol conversion and combine it with existing virus check functions. Even though it appears simple, by establishing a gateway, the point of responsibility is clarified, and data can be reliably verified to enhance safety. Business owners, please take a look at the incidents currently occurring. The longer business stoppages last, the more revenue and trust are lost. While the introduction of the OWCD requires initial investment, it represents a significant step forward in strengthening defenses without incurring operational labor costs. For inquiries, please contact us through our company website above.
Price information
There are no longer any measures that cannot be breached by software. OWCD is also highly compatible with zero trust. Implementation support is available. By adding physical barriers and layering, we can enhance business continuity and resilience through damage limitation. If business interruptions persist, not only revenue but also trust will be lost. OWCD is a cost-effective option for cyber resilience measures that can enhance defense capabilities without incurring operational labor costs. We encourage all SIers to consult with us. Please contact us through our company website as mentioned above.
Price range
P5
Delivery Time
※We are engaged in made-to-order production. Please contact us through our company website mentioned above.
Applications/Examples of results
Government agency information systems (communication backflow control in external email reception checks) Traffic information systems (one-way communication control from the control system to the public web server) Remote monitoring systems for industrial equipment (intrusion prevention at the data transmission unit) Supply chain information collection systems in the industrial sector (prevention of unauthorized intrusion into production facilities and unauthorized data extraction at the collection side) Core information management systems in research institutes (prevention of intrusion into research facilities and unauthorized data extraction from data servers) While there are many large-scale systems, the use is also expanding among small and medium-sized enterprises, starting with file management and IoT equipment status monitoring. As mentioned above, in addition to government agencies, power plants, manufacturers' research institutes, and production information transmission points, as well as IoT information transmission, it is actually also being utilized in defense systems. In today's digital society, there are intrusions from somewhere. The resilience to notice and start addressing issues at the early reconnaissance stage is essential. Let’s protect against reaching the core. The number of users is steadily increasing. We will also provide guidance on applications for special uses such as remote maintenance. Please make use of it. For inquiries, please contact us through our website above.
catalog(4)
Download All CatalogsCompany information
Our company is a member of the Mitsubishi Heavy Industries Group, serving as a design technology partner for Mitsubishi Heavy Industries, where we engage in planning and mechanical design for prime movers (steam turbines/boilers, gas turbines, water turbines), pumps, and various plants, as well as instrumentation control system planning and electrical design. In order to meet the increasingly diverse and sophisticated needs of our customers, we will continue to challenge ourselves to improve our technological capabilities, streamline operations, and reduce costs based on the trust we have built with users. Through this, we are developing activities that contribute to society by providing the products and engineering capabilities we have cultivated so far to everyone. Alongside the sale of products related to IoT, manufacturing DX, and on-site monitoring/condition monitoring, we will focus on custom orders, customization, and system construction to realize your ideas. We encourage you to consider utilizing our services. https://eng.power.mhi.com













