Control the Path.
Protect the Asset.
A nine-module system designed to govern how systems connect, how data moves, and how critical assets are protected when risk is at its highest.
Control brings together two layers of enforcement. One controls the path. The other protects the asset. Together, they reduce exposure, contain incidents, manage access, and secure what matters most.
Disconnect to Protect. Retain Control.
A modular control layer for enterprise and security teams. Nine modules governing how data is accessed, moved and disconnected across OT, CNI and defence infrastructure.
Control is built for environments where risk cannot be managed through software alone. It provides a structured way to govern connectivity, access, movement, storage, and response using a system of modules that can be combined into real-world blueprints.
Every security tool apart from Control monitors, alerts, or restricts. Control changes what can happen in the first place.
Physics, not promises.
A complete control system
Control is made up of nine modules across two distinct layers.
FIRE Layer
Controls the path
The FIRE layer controls the path. It governs when systems connect, how access is opened, when environments are separated, and how action is taken during live conditions.
VAULT Layer
Protects the asset
The VAULT layer protects the asset. It governs how data is transferred, locked, disconnected, archived, and held securely when exposure is not acceptable.
fire
Controlled Offline Access
vault
Secured Offline Data
Fracture
Break. Segment. Contain.
Isolate
Disconnect. Shield. Protect.
Relay
Route. Control. Enforce.
Execute
Trigger. Act. Terminate.
Vault
Store. Secure. Protect.
Unlink
Detach. Revoke. Clean.
Archive
Preserve. Freeze. Access.
Lock
Restrict. Deny. Defend.
Transfer
Send. Flow. Isolate.
Fracture
Break. Segment. Contain.
Isolate
Disconnect. Shield. Protect.
Relay
Route. Control. Enforce.
Execute
Trigger. Act. Terminate.
Vault
Store. Secure. Protect.
Unlink
Detach. Revoke. Clean.
Archive
Preserve. Freeze. Access.
Lock
Restrict. Deny. Defend.
Transfer
Send. Flow. Isolate.
fire
Controlled Offline Access
vault
Secured Offline Data
Together, these layers allow organisations to do more than detect risk. They allow them to control it.
Control the path
The FIRE layer governs connectivity and behaviour across the environment. It determines when something can connect, when it must be cut off, and how exposure is reduced before a threat becomes a crisis.
Fracture
Breaks connection paths to remove trust and stop attack progression.
Isolate
Separates systems and environments to contain risk and prevent spread.
Relay
Enables controlled, time-bound access when needed, without leaving systems exposed.
Execute
Triggers immediate control actions during live conditions and incidents.
Protect the asset
The VAULT layer governs how data and digital assets are handled, secured, and preserved.
Transfer
Controls how data moves between environments without creating exposure.
Lock
Restricts access based on identity, purpose, and condition.
Unlink
Removes persistent connections to reduce standing exposure.
Archive
Preserves data securely for retention, recovery, and evidence.
Vault
Protects critical assets in a controlled, offline environment.
Start with the outcome
Different environments require different types of control. The system is designed to meet those needs through structured blueprints.
Pre-defined ways to apply control
Blueprints combine modules from both layers to solve real-world challenges.
See how Control is applied across critical infrastructure, OT, and IT environments.
Explore Control solutions by sectorBecause connected systems are reachable systems
Most security strategies focus on protecting connected environments. Control starts by reducing what is connected in the first place.
If a path does not need to remain open, it should not remain open.
If access does not need to be persistent, it should not be persistent.
If an asset is too valuable to leave exposed, it should not be exposed.
That is the principle behind Control.
Take control before control is taken from you
Explore how Control can be applied to your environment.