There won't be any leaks from the OWCD data backup, right?
Data Diode OWCD Series
Is there a possibility that the backup storage data could be leaked? It's also important to have a system in place that prevents data from being stolen.
There have been a series of unauthorized encryptions and information leaks due to ransomware. With the development of generative AI, the opportunities to use the internet in offices are increasing, and while I believe we are protected by zero trust measures... Ultimately, there are security holes somewhere that allow intrusions, requiring several days to restore the system, during which business operations come to a halt. To prepare for such situations, it is effective to have layered backups of data both online and offline... Ransomware does not achieve its goal simply by intruding. It infiltrates to scout the system and obtain critical information, encrypting or exfiltrating data, which can damage your company's reputation. For this, it is necessary for the intruder to communicate and operate remotely from both inside and outside. If that communication is not possible, even if an intrusion occurs, the worst-case scenario has not yet happened, allowing time to detect and eliminate the threat through various methods. Backup data should be stored in the deepest part. If it can connect to the outside from there, it becomes a significant advantage for the intruder. By cutting off unnecessary lines, you can avoid major damage. Depending on how you use it, you can strengthen your defenses, so please consider it. For inquiries, please visit the related link below ⤵ There is also an explanatory video.
Inquire About This Product
basic information
The OWCD is positioned to restrict communication only in the inward direction along the data arrival route. Viruses send out information to remote operators to determine their location and whether it is beneficial or not. By blocking this with the OWCD, information will not go out from that point onward. Of course, the leakage of core information is also impossible. At first glance, it may seem that the data arrival point is completely exposed and nothing is being protected. In reality, the OWCD cannot pass common office communications (TCP/IP). This can be used to filter data during protocol conversion, making it easy to utilize various virus check functions that you use. While it may not be systemically streamlined and may not look good, by establishing such barriers, we can properly set responsibility boundaries, check data, and protect you. Business owners, please pay close attention to what is happening in the world. The longer the business suspension period lasts, the more sales and future credibility will disappear. Although there is an initial investment in using the OWCD, it can be a step towards strengthening protection with zero operating personnel costs. For inquiries, please contact us through our company website above.
Price information
There are variations depending on the communication bandwidth. It starts from around 1 million yen. We also accept system engineering for implementation (scope, cost, and delivery time are negotiable). Cyber resilience measures are fundamentally about protecting your customers' trust. There is no longer any software measure that cannot be breached. Let's combine it with physical measures to create multiple layers of defense and protect the core until we can address the issues. To all SIers, now is the time to respond to your customers' concerns. Please feel free to consult with us. For inquiries, please contact us through our website above.
Price range
P5
Delivery Time
※We produce made-to-order products. Please contact us through our company website above.
Applications/Examples of results
Government Agency Information Systems (Communication backflow control in external email reception checks) Traffic Information Systems (One-way communication control from the control system to the public web server) Remote Monitoring Systems for Industrial Equipment (Intrusion prevention at the data transmission unit) Supply Chain Information Collection Systems in the Industry (Prevention of unauthorized intrusion into production facilities and unauthorized data extraction at the collection side) Core Information Management Systems in Research Institutes (Prevention of intrusion into research facilities and unauthorized data extraction from data servers) While many of these systems are large-scale, their use is also expanding among medium and small enterprises, starting with file management and IoT equipment status monitoring. As mentioned above, in addition to government agencies, power plants, manufacturers' research institutes, and production information dissemination points, IoT information dissemination, they are also utilized in defense systems. In today's digital society, intrusions can occur from anywhere. The resilience to detect and respond at an early reconnaissance stage is essential. Let’s protect against reaching the core. The number of users is steadily increasing, and we also provide guidance on applications for special uses such as remote maintenance. Please make use of it. For inquiries, please contact us through our company website above.
catalog(4)
Download All CatalogsCompany information
Our company is a member of the Mitsubishi Heavy Industries Group, serving as a design technology partner for Mitsubishi Heavy Industries, where we engage in planning and mechanical design for prime movers (steam turbines/boilers, gas turbines, water turbines), pumps, and various plants, as well as instrumentation control system planning and electrical design. In order to meet the increasingly diverse and sophisticated needs of our customers, we will continue to challenge ourselves to improve our technological capabilities, streamline operations, and reduce costs based on the trust we have built with users. Through this, we are developing activities that contribute to society by providing the products and engineering capabilities we have cultivated so far to everyone. Alongside the sale of products related to IoT, manufacturing DX, and on-site monitoring/condition monitoring, we will focus on custom orders, customization, and system construction to realize your ideas. We encourage you to consider utilizing our services. https://eng.power.mhi.com


![[Improvement Case] Key Points for Replacing Old Control Devices with New Control Devices](https://image.mono.ipros.com/public/product/image/4e5/2001473709/IPROS2687036390109652537.png?w=280&h=280)


