There won't be any leaks from the OWCD data backup, right?
Data Diode OWCD Series
Is there a possibility that the backup storage data could be leaked? It's also important to have a system in place that prevents data from being stolen.
There have been a series of unauthorized encryption and information leaks due to ransomware. Intrusions often occur through emails, websites, social media, and VPN devices. With the development of generative AI, the opportunities to use the internet in offices have increased, but ultimately, intrusions can occur by breaking into systems, requiring several days to restore the system, during which business operations come to a halt. To prepare for such incidents, it is effective to have layered backups of data both online and offline, but... Ransomware does not achieve its goals merely by intruding. It involves reconnaissance within the system, penetrating to critical operational areas, and encrypting or exfiltrating data, which can damage your company's reputation. For this, it is necessary for the intruder to communicate and operate remotely. If that communication is not possible, even if an intrusion occurs, the worst-case scenario has not yet happened, allowing time to detect and eliminate the threat through various methods. Backup data should be stored deeply. If external access is possible from there, it becomes advantageous for the intruder. By cutting off unnecessary lines, you can avoid significant damage. Depending on how you use it, you can strengthen your defenses. Please consider this. For inquiries, please visit the related link below. There is also an explanatory video available.
Inquire About This Product
basic information
The OWCD will be configured to limit communication to only the "in" direction on the data arrival route. Viruses send out information to remote operators to determine their location and whether it is beneficial or not. If this is blocked by the OWCD, no information will go out from that point onward. Of course, the leakage of core information is also impossible. At first glance, it may seem that the data arrival point is completely exposed and nothing is being protected. In reality, the OWCD does not allow common office communications (TCP/IP) to pass through. This can be used to filter data when converting protocols, making it easy to utilize various virus check functions that you all use. While it may not be systemically slim or stylish, by establishing such barriers, we can properly set responsibility boundaries, check data, and protect you. Business owners, please pay close attention to what is happening in the world. The longer the business suspension period lasts, the more sales and future trust will disappear. Although there is an initial investment in using the OWCD, it can be a step towards strengthening protection with zero operational labor costs. For inquiries, please visit our company website above.
Price information
There are variations depending on the communication bandwidth. It is perfectly compatible with zero trust measures. We also accept system engineering for implementation (scope, cost, and delivery time are negotiable). Cyber resilience measures are fundamentally about protecting your customers' trust. There is no longer any software measure that cannot be breached. Let's combine it with physical measures to create multiple layers of defense and protect the core until we can address the issues. To all SIers, now is the time to respond to your customers' concerns. Please feel free to consult with us. For inquiries, please contact us through our company website above.
Price range
P5
Delivery Time
※We are engaged in made-to-order production. Please contact us through our company website above.
Applications/Examples of results
Government Agency Information Systems (Communication Backflow Control in External Email Reception Checks) Traffic Information Systems (One-Way Communication Control from Control Systems to Public Web Servers) Remote Monitoring Systems for Industrial Equipment (Intrusion Prevention at Data Transmission Units) Supply Chain Information Collection Systems in Industry (Prevention of Unauthorized Intrusions into Production Equipment and Unauthorized Data Exfiltration at Collection Points) Core Information Management Systems in Research Institutes (Prevention of Intrusions into Research Facilities and Unauthorized Data Exfiltration from Data Servers) While there are many large-scale systems, the use is also expanding among small and medium-sized enterprises, starting with file management and IoT equipment status monitoring. As mentioned above, in addition to government agencies, power plants, manufacturers' research institutes, and production information transmission points, IoT information transmission, we are also utilizing these systems in defense systems. In today's digital society, we face potential intrusions from various sources. The resilience to detect and respond promptly at the reconnaissance stage is essential. Let’s ensure that we protect against reaching the core. Our user base is steadily increasing, and we also provide guidance on applications for special uses such as remote maintenance. Please make the most of our services. For inquiries, please contact us through our company website above.
catalog(4)
Download All CatalogsCompany information
Our company is a member of the Mitsubishi Heavy Industries Group, serving as a design technology partner for Mitsubishi Heavy Industries, where we engage in planning and mechanical design for prime movers (steam turbines/boilers, gas turbines, water turbines), pumps, and various plants, as well as instrumentation control system planning and electrical design. In order to meet the increasingly diverse and sophisticated needs of our customers, we will continue to challenge ourselves to improve our technological capabilities, streamline operations, and reduce costs based on the trust we have built with users. Through this, we are developing activities that contribute to society by providing the products and engineering capabilities we have cultivated so far to everyone. Alongside the sale of products related to IoT, manufacturing DX, and on-site monitoring/condition monitoring, we will focus on custom orders, customization, and system construction to realize your ideas. We encourage you to consider utilizing our services. https://eng.power.mhi.com




![Case Study: Pump 1 [Public Facility] Inverterization of Chilled and Hot Water Pump](https://image.mono.ipros.com/public/product/image/52a/2000179933/IPROS1138739485224798626.jpg?w=280&h=280)


![[Detection Example] Intrusion Test 'BSS01/BSM02'](https://image.mono.ipros.com/public/product/image/2000691120/IPROS18001598474369024422.png?w=280&h=280)
![[Detection Example] Rolling Intrusion Test 'BSS01/BSM02'](https://image.mono.ipros.com/public/product/image/2000691121/IPROS373980400529156929.png?w=280&h=280)