Introducing RAAS Technology
REMOTE AUTOMATED AIRGAP SECURITY
The security isolation layer for sensitive enterprise data infrastructure
Darkskope has partnered with Goldilock to offer our clients next generation data security solutions.
GOLDILOCK TECHNOLOGY IS BUILT ON THREE CORE PREMISES:
1. Users need access to their sensitive data quickly, but only occasionally and for short periods of time. Otherwise, online data is more useful to hackers than rightful owners.
2. Sensitive data must be isolated, secured from physical contact and related human error, and fully backed-up.
3. Sensitive data must be quickly accessible when needed..
Platform & Technology
Relying on a framework of proven technologies and innovative processes, Goldilock delivers a unique security layer to protect digital assets and IT infrastructure that includes:
- Physical airgap disconnection from access networks
- Regressive connectivity and non-IP signal processing
- Biometric gateways
- Device recognition
- Personal generated access codes
- Two-Factor authentication
- Optional multi-signature security
- Secure dashboards and live reporting on access and usage
When utilizing Goldilock's SaaS-based offering, the solution also provides the following capabilities:
- Secured physical vaults
- Dedicated per-user hardware for processing storage of encrypted data
- Scalable physically-segregated connectivity solutions
- Multisite encrypted data backup
- Fully-insured third-party guarantees for the extraction and delivery of data to owners on demand or in the case of business disruption
Goldilock enhances traditional data and endpoint protection by adding an additional physical layer of security previously unavailable in the market. Our patent-pending solution weaves together a completely new combination of the highest security layers and protocols unknown to hackers – and yet for the user it is uncomplicated.
1. Wallet is stored offline in an encrypted data vault, physically disconnected from the internet.
2. Using a non-IP mechanism, the user activates their wallet making it accessible over the internet.
3. User can securely access their wallet over an encrypted connection using a dedicated URL and access credentials.