The intrusion of information-gathering malware cannot be completely prevented. Let's effectively use data diodes (OWCD) as a communication restriction to protect ourselves from data theft and encryption.
The horror of ransomware lies not only in its ability to steal data but also in its power to halt daily life. It steadily infiltrates deep within systems, targeting file servers and database servers to launch attacks. “Info-stealer” malware is at work, stealing authentication information and thoroughly investigating targets before launching an attack, identifying the locations of important business secrets and personal information. Unlike the moment when a system is encrypted and it becomes immediately apparent that an attack has occurred, the stealthy operation of information-gathering malware allows it to collect data without the victim realizing it, often having infiltrated days in advance and causing data leaks. This malware sends the information it has gathered back to external attackers by tracing the infiltration route. By blocking that communication channel, it secures time until other security measures or virus removals can take effect, minimizing operational downtime. Boundary control is not just for preventing intrusions. The data diode "OWCD" physically restricts communication in one direction, allowing for high security even without on-site personnel due to its physical method. For inquiries, please refer to the related links below.
Inquire About This Product
basic information
Typically, the communication used in offices involves not only the data you send but also signals that control communication in the reverse direction. We replace this communication with a method that does not require the transmission of this control signal in front of the OWCD, making it one-way. That signal is communicated through the OWCD and decoded at the exit for your use. Communication control can also be done with firewalls and routers, but the OWCD is free from configuration errors; it can only transmit in one direction. There is no reverse circuit, so no signals can flow from the opposite direction, effectively shutting out remote control signals emitted by viruses and the theft of files that attackers want to exfiltrate. While large corporations often make headlines for their attacks, about 60% of confirmed ransomware incidents in Japan involve small and medium-sized enterprises. The primary targets are organizations such as manufacturing companies, medical institutions, local governments, and schools that do not have security personnel on-site. There is no need to set communication restrictions on the OWCD itself. Even if regular maintenance cannot be performed, the level of security will definitely improve. Zero trust dislikes boundary control, but the OWCD, which imposes restrictions, is highly compatible! It is advantageous for micro-segmentation. For inquiries, please refer to the related links above.
Price information
We provide communication software compatible with various protocols that can operate on the communication processing PC prepared by customers, using the OWCD-2 with 100MBase-T connection and the OWCD-G with 1000MBase-T connection as core products. While the initial investment may be on the higher side, the reduction in lifecycle costs is significant. The damage caused by ransomware is more severe the deeper it is rooted. Various countermeasures have been suggested, but at a minimum, let's establish a robust multi-layer defense with boundary control and backups. For inquiries, please refer to the related links above.
Price range
P5
Delivery Time
※Please contact us for prices. You can find related links above.
Applications/Examples of results
Over 150 units sold to date. We have numerous achievements in remote monitoring of thermal power plants. While I can't discuss specifics, the utilization in critical infrastructure such as important departments within government agencies, public institutions, transportation, and companies in the chemical, pharmaceutical, and ceramics sectors is steadily increasing. Digital transformation (DX) brings convenience but also structurally increases the "risk of stopping." The so-called "zero trust" model, which suggests that no one can be trusted and therefore requires authentication, is fundamentally based on the assumption of connectivity. However, in critical infrastructure, the requirement is often "no external connections," making zero trust incompatible. This is where the disconnected OWCD comes into play. No single method can ensure complete security. It is essential to combine various defense measures in a layered approach. In addition to the introduction mentioned this time, methods that completely separate incoming communications from an unspecified number of external sources and outgoing communications to specific destinations to prevent the activities of information-gathering malware, and those that reliably prevent intrusions from remote maintenance lines, are also beginning to gain traction. The use of unique solutions provided by system integrators (SIers) is also rapidly increasing! For inquiries, please visit the related links above.
catalog(17)
Download All Catalogs
Company information
Our company is a member of the Mitsubishi Heavy Industries Group, serving as a design technology partner for Mitsubishi Heavy Industries, where we engage in planning and mechanical design for prime movers (steam turbines/boilers, gas turbines, water turbines), pumps, and various plants, as well as instrumentation control system planning and electrical design. In order to meet the increasingly diverse and sophisticated needs of our customers, we will continue to challenge ourselves to improve our technological capabilities, streamline operations, and reduce costs based on the trust we have built with users. Through this, we are developing activities that contribute to society by providing the products and engineering capabilities we have cultivated so far to everyone. Alongside the sale of products related to IoT, manufacturing DX, and on-site monitoring/condition monitoring, we will focus on custom orders, customization, and system construction to realize your ideas. We encourage you to consider utilizing our services. https://eng.power.mhi.com







![[Data] Data diodes provide cybersecurity for substations.](https://image.mono.ipros.com/public/product/image/2050212/IPROS1060237848567759815.jpg?w=280&h=280)

![[Data] Use Cases of Critical Infrastructure](https://image.mono.ipros.com/public/product/image/2050212/IPROS17507949305508091617.jpg?w=280&h=280)

