Title
Goldilock - Remote Non-IP Physical AirGap - Goldilock Secure
Go Home
Category
Description
Patented technology for remote controlling of airgap nodes without using the internet. Reduce cyber attack surface. Keep assets offline until needed.
Address
Phone Number
+1 609-831-2326 (US) | Message me
Site Icon
Goldilock - Remote Non-IP Physical AirGap - Goldilock Secure
Tags
Page Views
0
Share
Update Time
2022-05-08 01:24:02

"I love Goldilock - Remote Non-IP Physical AirGap - Goldilock Secure"

www.goldilock.com VS www.gqak.com

2022-05-08 01:24:02

Skip to contentMenuUse CasesTeamNewsContactOrder / TryOrder Goldilock HostedTry Goldilock On-PremAccount details0 items Goldilock TruAirgap™ PHYSICALLY DISCONNECT AND CONNECT ANYTHING,TO AND FROM THE INTERNET, REMOTELY, INSTANTLY,WITHOUT USING THE INTERNET Use Cases Request Demo About GoldilockIntroducing True AirGap ProtectionCompletely control when your digital assets are physically connected to the internet.No software, no tricks, just true airgap that’s not controlled over the internet.Impossible? Read on…Our VisionGoldilock is based on the premise that your assets should not be physically connected to the Internet when you’re not using them, but that they must be available to you from anywhere immediately when you want to access them. That process, however, should not be controlled over the internet. Our patented remote TruAirgap™ security technology allows asset owners to remotely and instantly physically connect and disconnect those assets (servers, networks, OT systems, data repositories) to and from the internet without using the internet to do so. Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.The TechnologyGoldilock is revolutionizing the way data and IT infrastructure are protected on the internet by allowing you to physically connect and disconnect anything from anywhere, in seconds without using the internet to do so. Our unique, patented platform utilizes secure non-internet communications, biometrics, strong multi-factor authentication, non-IP technology triggers, and cryptography to keep your sensitive digital assets physically segregated from any network, while still having them accessible at a moment’s notice from anywhere on earth. Use Cases & Deployment Options Use Cases Critical Infrastructure OT Critical Infrastructure cyber attacks can cripple society. Most Operational Control Systems are network connected 24/7 presenting a significant attack vector.The rationale for this is often convenience for monitoring, updating and managing. TruAirgap™ lets owners of critical infrastructure keep control systems completely disconnected until the second they are needed – or, alternatively, to disconnect them with a moment’s notice. No more costly ‘in-person’ visits to remote infrastructure for data collecting and management. TruAirgap™ lets you connect/disconnect from wherever you are. Defense & Security Cybersecurity is now national security. Reducing the attack surface is paramount. With no reason to have internal operations exposed to the wider internet, Goldilock allows complete segregation, with selected, impenetrable and unhackable connection command pathways. Goldilock is the world’s most secure solution for isolating national security assets, keeping remotely managed weapons systems and platforms disconnected until needed or even allowing hyper secure exchange of information scenarios. Cyber Kill Switch In the event of zero-day day attacks and/or breaches, time is of the essence. In order to isolate assets, prevent lateral movement and ensure network integrity the last resort is often complete disconnection. For organizations this can mean hours in not days of physically gaining access to offices, data centres and even geographical locations. This is not only impractical, but horribly expensive. Goldilock TruAirgap™ is layer 1 and completely infrastructure agnostic. You can deploy it quickly and easily throughout to provide strategic isolation or overall ‘kill switches’. Custody Providers Are you responsible for the valuable digital assets of others? Do you want the security of cold storage with the speed, access and flexibility of hot storage? Sleep easier knowing those assets are completely physically disconnected from the internet when they’re not being used, but instantly available, only to you, and the process of control does not use the internet. You can also control access in a secure multi-approval scenario where multiple authorized parties must allow availability using the same hyper secure Goldilock system. Have total control and reduce vulnerability to near zero with minimal cost and effort. Secure Digital Vault Goldilock enables the secure, physically disconnected storage of sensitive information such as identification documentation, passwords, bank account and credit card information, validated KYC information, or private contracts. The Goldilock platform allows authorized users to securely approve sharing of their data and can act as an approval mechanism and escrow for transactions between multiple parties. Secure Backup TruAirgap™ is a game-changing endpoint protection layer that works seamlessly with your existing endpoint security solutions to create an impenetrable defense against even the most sophisticated attacks. Providing physical separation as a defense against known and unknown attacks reduces your attack surface to zero and protects your data from deletion, exfiltration, ransomware, sabotage and more. Healthcare Nothing is more sensitive than healthcare data, and almost nothing is more essential than healthcare infrastructure; compromise of either can be catastrophic. By allowing the complete physical disconnection and segregation those assets, either in attack prevention, o response, TruAirgap™ protects your devices, networks and facilities. TruAirgap™ technology allows healthcare managers to have ultimate control over those assets. Compliance is important, but the trust of patients and society is even more important. Goldilock can help to ensure that trust is not misplaced. Certificate Key Management Hybrid cloud infrastructures and increasingly complex IT environments create a challenge for management of company certificates. Goldilock enables secret stores and HSMs to be disconnected from the Internet until access is required by an authorized user, providing both security and accessibility. This isolation layer allows secure storage of private keys for backup, escrow, or as a mailbox mechanism. Data Regulation and Compliance Governments worldwide are adapting to the sensitivity of data, with jurisdictions implementing strict regulations such as HIPAA, GDPR, CCPA, LGPD, POPI and others to enforce security and compliance. Fines can be eye-watering. However, most regulations offer ‘best effort’ scenarios, and there is no better effort than keeping sensitive data completely off the internet. TruAirgap™ allows you to do this and yet have instant access. Alternatively Goldilock can act as a ‘kill switch’ – giving you the power to instantly respond to threats by disconnecting data, devices and networks from the internet. Lights Out Solution The vast majority of companies on earth keep regular working hours. Cyber security is confusing and difficult for many of them, but by virtue of their operating hours they can mitigate or eliminate a great deal of cyber threat by completely isolating their operations in non-working hours. Goldilock allows small and medium enterprises to sever their internal business networks from the internet after closing hours, while allowing management on-demand access for comptrolling, auditing and work-from-home activities when necessary. Goldilock - How it works Our News and Threats in the MediaGreg AkersGreg Akers Greg Akers, CCIE joins GoldilockWe are proud to welcome Gregory Akers, CCIE to Goldilock TruAirgap™ as our US Technical Advisor.Greg was Senior Vice President & CTO of Advanced Security Research & Government and CTO within the Security &Trust Organization (STO) group at Cisco. With more than two decades of executive experience, Akers brings a wide range of technical and security knowledge to Goldilock.In addition, Akers is an Internet security and critical infrastructure protection advisor to the U.S. government, regularly advising and directing activities related to technology and security matters of domestic and international importance. Read More On Premise Try & BuyFor a limited time we’re offering a contracted Try & Buy program for select early adopters and institutions. We’re that confident that you’ll love Goldilock TruAirgap™ that we’ll send you a unit for a time-limited test. We’re getting feedback for use cases within companies that we hadn’t even thought of! We’re looking forward to seeing how you deploy TruAirgap™. Follow the link to sign-up. Read More The ConversationExample Company Cyber Attacks to Critical Infrastructure Threaten our Safety and WellbeingWhat would happen if you could no longer use the technological systems that you rely on every day? I’m not talking about your smart phone or laptop computer, but all those systems many of us often take for granted and don’t think about.What if you could not turn on the lights or power your refrigerator? What if you could not get through to emergency services when you dial 911? What if you could not access your bank account, get safe drinking water or even flush your toilet? Read More Investopedia 20% of All BTC Lost/Unrecoverable…a cold wallet (one that is used offline) is generally seen as a highly secure way of storing digital assets. However, if the wallet owner loses his or her access key, that wallet may be permanently inaccessible, along with the tokens it contains…For users who misplace a wallet or key, the process can be overwhelmingly frustrating… Read More The Whitehouse US Gov. Whitehouse shares Cyber Checklist - Airgap features…Back up your data and ensure you have offline backups beyond the reach of malicious actors; …Mandate the use of multi-factor authentication on your systems to make it harder for attackers to get onto your system;… Read More Bleeping Computer Software AG IT giant hit with $23 million ransom by Clop ransomwareThe Clop ransomware gang hit the network of German enterprise software giant Software AG last Saturday, asking for a ransom of $23 million after stealing employee information and company documents. Read More New York Times Equifax to Pay at Least $650 Million in Largest-Ever Data Breach SettlementThe credit bureau Equifax will pay about $650 million — and perhaps much more — to resolve most claims stemming from a 2017 data breach that exposed sensitive information on more than 147 million consumers and demonstrated how little control Americans have over their personal data. Read More Threat Post COVID-19 Clinical Trials Slowed After Ransomware AttackThe attack on eResearchTechnology potentially slowed down coronavirus research worldwide, and researchers suggest a nation-state actor could be behind the incident. Read More Good Audience The Unseen Danger of KYCWe constantly hear the dangers that centralized exchanges face. Stealing of assets is the biggest concern. The remote nature of a crypto hack causes people to feel they’re so vulnerable since inherently, it can come from anywhere. I think there is a bigger threat than a crypto robbery of an exchange. The information that is potentially available to attackers if they are to gain access to crypto exchange data will cause much more damage than funneling of stolen crypto funds. Read More The Verge Two-factor Authentication is a Mess years, two-factor authentication has been the most important advice in personal cybersecurity — one that consumer tech companies were surprisingly slow to recognize. The movement seemed to coalesce in 2012, after journalist Mat Honan saw hackers compromise his Twitter, Amazon, and iCloud accounts, an incident he later detailed in Wired. At the time, few companies offered easy forms of two-factor, leaving limited options for users worried about a Honan-style hack. The result was a massive public campaign that demanded companies to adopt the feature, presenting two-factor as a simple, effective way to block account takeovers.Read More Variety Hacked Law Firm Informs Clients Like Lady Gaga and Bruce Springsteen of Data BreachMajor media and entertainment law firm Grubman Shire Meiselas & Sacks said that after its internal data systems were hacked — and a vast trove of information on its clients was stolen — it has informed its roster of A-list clients of the breach. Read More Learn more about our AirGap Technology Request a Demo We are Goldilock Our team has…well, centuries of combined experience in information technology, deep tech, financial services, sales and marketing, with a consistent focus on innovation. For us, Goldilock is a calling. We believe that the internet is essential, but it has become a very dangerous place to be all the time. We set out to solve that problem in an elegant, simple and scalable way. If you’re interested in joining us in our mission; in hardware or software development, sales, marketing, administration or even as an external partner, get in touch with us using the contact form. Tony Hasek / CEO Founder and CEO // AN EXPERIENCED ENTREPRENEUR AND COMPANY BUILDER WITH A HISTORY OF PREDICTING MARKET CHANGES, ENVISIONING NEEDS, AND BUILDING SOLUTIONS TO ADDRESS THEM. TONY HAS RAISED MILLIONS FROM LEADING VC FIRMS FOR HIS OWN AND OTHER VENTURES. HE FOUNDED, SCALED & EXITED ONE OF THE LARGEST APPLE PARTNER/SYSTEM INTEGRATION COMPANIES IN EUROPE AND OPENED THE FIRST APPLE STORE EAST OF BERLIN. HE HAS EXPERIENCE IN SOFTWARE AND APP DEVELOPMENT, AND FOUNDED AND EXITED ONE OF EUROPES FIRST E-SERVICES VENTURES. HIS VISION IS FOR THE INTERNET TO BE A SAFER PLACE FOR ALL. Stephen Kines / COO Co-Founder // STEPHEN IS AN INTERNATIONAL CORPORATE LAWYER WITH EXPERTISE IN COMPLEX M&A AND TAX EFFICIENT COMMERCIAL TRANSACTIONS IN THE US, UK AND EMERGING MARKETS. HE HAS BEEN A GENERAL COUNSEL FOR ULTRA-HIGH NET WORTH INDIVIDUALS AND FAMILIES AS WELL AS INTERNATIONAL LAW FIRMS. HE IS FOCUSED ON EMERGING TECHNOLOGIES, INCLUDING BLOCKCHAIN AND CYBERSECURITY. A NATURAL MANAGER, HE ALSO HAS A PASSION FOR COMMUNITY ENGAGEMENT AND SUSTAINABILITY. Richard Bate / CTO RICHARD IS AN EXPERIENCED TECHNICAL LEAD, HOLDING MULTIPLE SENIOR POSITIONS THROUGHOUT THE UK TECH STARTUP SECTOR. HE BRINGS OVER A DECADE OF PROJECT MANAGEMENT EXPERIENCE IN LARGE SCALE IT INFRASTRUCTURE APPLICATIONS. HE IS PARTICULARLY ADROIT AT DEVISING, REFINING AND COMMERCIALIZING TECHNICAL SOLUTIONS. WITH A SPECIALIZATION ON HANDS-ON TECHNOLOGY DEVELOPMENT, RICHARD EXCELS AT CREATING SIMPLE SOLUTIONS TO COMPLEX HARDWARE AND SOFTWARE PROBLEMS. Dr. Jason Gamage / CISO Jason is a seasoned enterprise security management professional with over 31 years of global experience spanning 4 continents. He has worked for Microsoft, Merrill Lynch, Delek US Holdings, Nintendo, Fashion Nova and AVG. A regular speaker and panelist at security conferences, he recently presented at Black Hat. A former member of the US Army PsyOps unit, he holds a PhD in Forensic Psychology. Sergio Alonso / VP Partnerships Sergio comes from a Channels and Partnerships and inside sales background with such international players as Emerson, Siemens and Avocent. Based in Madrid, Sergio handles Partnership discussions for Goldilock with Resellers, MSSP's, Distributors and geographic partners worldwide. Denisa Hudečeková / Project Mgmt. Lead Denisa comes from a long-standing career in aerospace project management with the likes of Rolls Royce, GE Aviation and Honeywell. She has worked in the Czech Republic and Germany and virtually managed customer sales representative teams in China, the US, Canada and India.Denisa is multilingual; structured, & detail oriented with high personal responsibility to reach set goals. In her own words, she "gets things done." Kenny Phipps / VP Sales Engineering VP, Sales Engineering & Projects // Kenny is a respected Project Manager with thousands of hours on business change and technical projects. With 25 years as a Professional Contract Project Manager, he has worked in both public and private sector across Europe for brands like Fujitsu, DHL, Bank of England, Novartis and Dell. He has a cloud and cybersecurity background. Pavel Kucera / CMO Paul believes communication is the basic building block of business. He cut his teeth at global PR and Strategy powerhouse Hill&Knowlton. Since then he has been retained as an expert consultant with fortune 500 companies like EMC, Netapp, HP, Siemens Mobile, Vodafone, T-Mobile, Motorola, MotLockheed Martin, Pfizer, and GlaxoSmithkline. Keith Parnell / Head of Americas Consulting Lawyer & Business Development Executive for US Operations. Keith is a multi-jurisdictional corporate transactions lawyer and business strategist with more than 27 years of advisory experience. He recently completed a level II security clearance appointment to the Canadian Government. Chris Hurd / Director Asia A highly experienced business professional with a multinational career in wholesale banking, having held senior MD positions in the UK, Singapore ( as Head of Global Banking for HSBC ) and Russia. Has worked with a wide range of industry sectors including Oil and Gas, Consumer Brands and Financials and is a Distinguished Fellow of the Institute of Banking and Finance, Singapore. Chris has a keen interest in new tech, high growth potential companies and is responsible for Goldilock’s business development and relationships across the APAC region. Simon Hudd VP Regulatory Affairs RESPONSIBLE FOR REGULATORY AND CORPORATE AFFAIRS AND UK SALES, SIMON IS A MULTI-JURISDICTIONAL CORPORATE LAWYER SPECIALISING IN CORPORATE FINANCE, MERGERS & ACQUISITIONS. HE HAS 20 YEARS OF EXPERIENCE WITH TECHNOLOGY COMPANIES, HELPING EMERGING MARKET CLIENTS IN COMMERCIALISING THEIR GROUND BREAKING TECHNOLOGIES AND RAISING FUNDS FOR RESEARCH AND DEVELOPMENT AS WELL AS INTERNATIONAL EXPANSION. Gregory Akers CCIE / Advisor Greg Akers was Senior Vice President & CTO of Advanced Security Research & Government and CTO within the Security & Trust Organization (STO) group at Cisco. With more than two decades of executive experience, Akers brings a wide range of technical and security knowledge to Goldilock. In the past, a major focus of his work was to expand security awareness and launch product resiliency initiatives throughout Cisco’s development organization to deliver high-quality and secure products to customers.Greg is an Internet security and critical infrastructure protection advisor to the U.S. government, regularly advising and directing activities related to technology and security matters of domestic and international importance. Don Olechowski / Advisor With degrees from Royal Military College and MIT, Don is one of the most senior engineering managers at Tesla having built and run the engineering and support teams doing the low and high voltage electrical harnesses for all of Tesla’s vehicles. Don is a seasoned executive with broad-based understanding of automotive and aerospace engineering and engineered materials manufacturing. Paul Wallis / Advisor A Business Development and Sales Director with significant strategic management experience and creative business leadership and 20+ years continuous career progression within the Broadcast, and Display and Cloud Media Delivery Segments (including 18 years with Sony). Paul has extensive experience of leading operations in Europe, Eastern Europe, the Middle East and South America at Country Manager and Regional Head levels. ContactGet in touch Request a demo today. We can show you how ring-fencing key infrastructure or taking key network components on and offline is as easy as making a phone call.Goldilock™ is based on the premise that your data should not be physically connected to the internet when you’re not using it, but that it does need to be available to you from anywhere immediately when you want to access it.Goldilock has offices in Prague, Madrid, Abu Dhabi, Singapore (US office coming soon) with our HQ in London. Get in touch and we’ll route your inquiry to the nearest region.Registered Office: Goldilock Secure Limited 118 Pall Mall, London. SW1Y 5EA. United Kingdom (not for correspondence)Goldilock Secure Limited (UK Operations and Correspondence Address)Ascot 5, Centrix House, Keys Park Road, Cannock. WS12 2HAsales@goldilock.com Connect with GoldilockCopyright © 2021 Goldilock Secure Limited / Privacy Policy – OnePress theme by FameThemes