GOLDILOCK TECHNOLOGY IS BUILT ON THREE CORE PREMISES:
1. Users need access to their sensitive data quickly, but only occasionally and for short periods of time. Otherwise, online data is more useful to hackers than rightful owners.
2. Sensitive data must be isolated, secured from physical contact and related human error, and fully backed-up.
3. Sensitive data must be quickly accessible when needed..
Relying on a framework of proven technologies and innovative processes, Goldilock delivers a unique security layer to protect digital assets and IT infrastructure that includes:
When utilizing Goldilock's SaaS-based offering, the solution also provides the following capabilities:
Goldilock enhances traditional data and endpoint protection by adding an additional physical layer of security previously unavailable in the market. Our patent-pending solution weaves together a completely new combination of the highest security layers and protocols unknown to hackers – and yet for the user it is uncomplicated.
1. Wallet is stored offline in an encrypted data vault, physically disconnected from the internet.
2. Using a non-IP mechanism, the user activates their wallet making it accessible over the internet.
3. User can securely access their wallet over an encrypted connection using a dedicated URL and access credentials.