How to use data diodes to prevent the escalation of ransomware damage
Data Diode OWCD
Digital transformation also emphasizes the importance of system protection. Let's effectively use data diodes (OWCD) as a communication restriction to protect ourselves from information-gathering malware reconnaissance.
The true horror of ransomware lies not in stealing data, but in its power to halt daily life. It infiltrates deep within systems, targeting file servers and database servers to launch attacks. As the name "infostealer" suggests, information-gathering malware is at work. Before launching a ransomware attack, it steals authentication credentials and thoroughly investigates the target. Unlike when files are encrypted and it's immediately obvious that an attack has occurred, information-gathering malware collects data without the victim realizing it. It steals system information, which later aids attackers when they infiltrate the system or expand their infection after gaining access. Upon investigation, it may be found that the intrusion occurred days prior, leading to data leaks. The information is sent to the attacker following the path of intrusion. By blocking the information produced by this information-gathering malware, much of the damage can be prevented. This can be achieved by equipping the system with an OWCD. The data diode "OWCD" accomplishes a physical one-way communication restriction. Moreover, since it is a physical method, it can be used safely even without on-site personnel. For inquiries, please refer to the related links below.
Inquire About This Product
basic information
Communication typically used in offices includes not only the signals you send but also control signals that manage the communication. We will replace the communication method with one that does not require these control signals and is unidirectional. The signals will be communicated through the OWCD, which will decode them for your use. If the communication is only one-way, it can be done with firewalls or routers, but the OWCD can only transmit in one direction; there is no circuit for the reverse direction. Therefore, no signals will flow from the opposite direction, effectively shutting out remote control signals emitted by viruses and the exfiltration of files that attackers want to steal. While reports often highlight the impact on large corporations, it is actually small and medium-sized enterprises that suffer the most from ransomware attacks. About 60% of the confirmed ransomware incidents in Japan involved small and medium-sized businesses. The primary targets are organizations without dedicated security personnel, such as manufacturing companies, medical institutions, local governments, and schools. There is no need for the OWCD itself to have settings that impose communication restrictions. Even if regular maintenance cannot be performed, the level of security will definitely improve. Zero Trust dislikes boundary control, but the OWCD, which imposes boundary restrictions, is highly compatible! For inquiries, please refer to the related links above.
Price information
We offer communication software compatible with various protocols that can operate on communication processing PCs prepared by customers, including the OWCD-2 with 100MBase-T connection and the OWCD-G with 1000MBase-T connection as core products. Additionally, we have an "i" model that is integrated with the communication processing PC. While the initial investment may be on the higher side, the reduction in lifecycle costs is significant. The damage caused by ransomware is more severe the deeper it runs. Let's build a smart multi-layer defense to prevent that from happening. For inquiries, please refer to the related links above.
Price range
P5
Delivery Time
※Please contact us for pricing. You can find related links above.
Applications/Examples of results
Over 130 units sold to date. We have numerous achievements in remote monitoring of thermal power plants. While I can't discuss specifics, the use in critical infrastructure such as government agencies, public institutions, transportation, and important sectors within companies (like critical infrastructure and research facilities) is on the rise. By exploiting known vulnerabilities at the network's entry and exit points, such as VPN devices, attackers can establish a foothold inside. They take advantage of lax password management to seize administrative privileges on database servers, file servers, and some terminals, allowing them to search for personal information and identify critical systems. With much of business operations relying on systems, a single server failure can ripple through the entire company's production and shipping. A system failure that controls real-time information halted everything in factories, logistics, and sales. Digital transformation (DX) brings convenience but also structurally increases the risk of "stopping." There is a growing trend of completely separating incoming communications from an unspecified number of external sources and outgoing communications to specific destinations to prevent the activities of information-gathering malware. The utilization of unique solutions provided by system integrators (SIers) is also rapidly increasing! For inquiries, please visit the related links above.
catalog(17)
Download All Catalogs
Company information
Our company is a member of the Mitsubishi Heavy Industries Group, serving as a design technology partner for Mitsubishi Heavy Industries, where we engage in planning and mechanical design for prime movers (steam turbines/boilers, gas turbines, water turbines), pumps, and various plants, as well as instrumentation control system planning and electrical design. In order to meet the increasingly diverse and sophisticated needs of our customers, we will continue to challenge ourselves to improve our technological capabilities, streamline operations, and reduce costs based on the trust we have built with users. Through this, we are developing activities that contribute to society by providing the products and engineering capabilities we have cultivated so far to everyone. Alongside the sale of products related to IoT, manufacturing DX, and on-site monitoring/condition monitoring, we will focus on custom orders, customization, and system construction to realize your ideas. We encourage you to consider utilizing our services. https://eng.power.mhi.com








