Routers are no longer the rigid boundary between inside and outside, as they used to be.
Even when intruded by ransomware, etc., important data is fully protected and always maintained in a recoverable state.
○The SAFE can physically communicate only with the server within the network. |
○Server → SAFE: Inaccessible |
○SAFE → Server: Accessible. SAFE will get the backup from the server. |
○Backups can be accessed by special operations during recovery. |
○SAFE are not found or accessible after being invaded and scanned through the network |
○Survive a ransomware attack |
The method of exposing router ports to allow remote access has become very dangerous.
Exposed ports are visible to enemies when they scan the network.
We enhance security by:
○Our externally accessible servers accept connections from customer's servers. Our public server has strict access restrictions, 24 hour packet logs are acquired and monitored. |
○Customer's servers access our server at regular intervals. Disconnect immediately unless a remote connection is required for maintenance. |
○When remote connection is required, we will reverse connect based on the connected route. |
○Communication is encrypted, so even if it is tapped along the way, the contents of the data cannot be read. |
○This scheme allows customers to receive maintenance safely. |