Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026HertzUndisclosed records stolen2026NHS ScotlandUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Co-operative GroupUndisclosed records stolen2025Jaguar Land RoverUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023British LibraryUndisclosed records stolen2023Royal MailOperations halted records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026HertzUndisclosed records stolen2026NHS ScotlandUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Co-operative GroupUndisclosed records stolen2025Jaguar Land RoverUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023British LibraryUndisclosed records stolen2023Royal MailOperations halted records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Firevault Control
Control

Control the Path.
Protect the Asset.

A nine-module system designed to govern how systems connect, how data moves, and how critical assets are protected when risk is at its highest.

Control brings together two layers of enforcement. One controls the path. The other protects the asset. Together, they reduce exposure, contain incidents, manage access, and secure what matters most.

DISCONNECT TO PROTECT

Disconnect to Protect. Retain Control.

A modular control layer for enterprise and security teams. Nine modules governing how data is accessed, moved and disconnected across OT, CNI and defence infrastructure.

Control is built for environments where risk cannot be managed through software alone. It provides a structured way to govern connectivity, access, movement, storage, and response using a system of modules that can be combined into real-world blueprints.

Every security tool apart from Control monitors, alerts, or restricts. Control changes what can happen in the first place.

Physics, not promises.

Two Layers. Nine Modules.

A complete control system

Control is made up of nine modules across two distinct layers.

FIRE Layer

Controls the path

The FIRE layer controls the path. It governs when systems connect, how access is opened, when environments are separated, and how action is taken during live conditions.

VAULT Layer

Protects the asset

The VAULT layer protects the asset. It governs how data is transferred, locked, disconnected, archived, and held securely when exposure is not acceptable.

Firevault

fire

Controlled Offline Access

vault

Secured Offline Data

Fracture

Fracture

Break. Segment. Contain.

Isolate

Isolate

Disconnect. Shield. Protect.

Relay

Relay

Route. Control. Enforce.

Execute

Execute

Trigger. Act. Terminate.

Vault

Vault

Store. Secure. Protect.

Unlink

Unlink

Detach. Revoke. Clean.

Archive

Archive

Preserve. Freeze. Access.

Lock

Lock

Restrict. Deny. Defend.

Transfer

Transfer

Send. Flow. Isolate.

Firevault
Fracture

Fracture

Break. Segment. Contain.

Isolate

Isolate

Disconnect. Shield. Protect.

Relay

Relay

Route. Control. Enforce.

Execute

Execute

Trigger. Act. Terminate.

Vault

Vault

Store. Secure. Protect.

Unlink

Unlink

Detach. Revoke. Clean.

Archive

Archive

Preserve. Freeze. Access.

Lock

Lock

Restrict. Deny. Defend.

Transfer

Transfer

Send. Flow. Isolate.

fire

Controlled Offline Access

vault

Secured Offline Data

Together, these layers allow organisations to do more than detect risk. They allow them to control it.

The FIRE Layer

Control the path

The FIRE layer governs connectivity and behaviour across the environment. It determines when something can connect, when it must be cut off, and how exposure is reduced before a threat becomes a crisis.

Fracture

Fracture

Breaks connection paths to remove trust and stop attack progression.

Isolate

Isolate

Separates systems and environments to contain risk and prevent spread.

Relay

Relay

Enables controlled, time-bound access when needed, without leaving systems exposed.

Execute

Execute

Triggers immediate control actions during live conditions and incidents.

The VAULT Layer

Protect the asset

The VAULT layer governs how data and digital assets are handled, secured, and preserved.

Transfer

Transfer

Controls how data moves between environments without creating exposure.

Lock

Lock

Restricts access based on identity, purpose, and condition.

Unlink

Unlink

Removes persistent connections to reduce standing exposure.

Archive

Archive

Preserves data securely for retention, recovery, and evidence.

Vault

Vault

Protects critical assets in a controlled, offline environment.

What Are You Trying to Control?

Start with the outcome

Different environments require different types of control. The system is designed to meet those needs through structured blueprints.

Stop ransomware spreading across your network
Contain a breach before it escalates
Control third-party and vendor access
Protect OT and critical infrastructure systems
Secure leadership and operational data
Prove compliance without exposing systems
Control Blueprints

Pre-defined ways to apply control

Blueprints combine modules from both layers to solve real-world challenges.

See how Control is applied across critical infrastructure, OT, and IT environments.

Explore Control solutions by sector
Why Control Exists

Because connected systems are reachable systems

Most security strategies focus on protecting connected environments. Control starts by reducing what is connected in the first place.

If a path does not need to remain open, it should not remain open.

If access does not need to be persistent, it should not be persistent.

If an asset is too valuable to leave exposed, it should not be exposed.

That is the principle behind Control.

Take control before control is taken from you

Explore how Control can be applied to your environment.