Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Back to Guides
Guidesadvanced

Storage Buyer's Guide

A decision-maker's guide to enterprise-scale offline storage infrastructure. Learn how Storage by Firevault delivers the '0' in your 3-2-1-0 backup strategy.

15 min read
Share

Executive Summary

Who this guide is for: IT Directors, Infrastructure Managers, CISOs, and enterprise architects responsible for data protection at scale.

What you will learn: How Storage by Firevault provides enterprise-grade offline storage infrastructure, what differentiates it from traditional backup, and how to evaluate whether it fits your architecture.

Key takeaway: Storage is the '0' in the 3-2-1-0 model. It is the offline, unreachable layer that ensures recovery even when everything else is compromised.

What is Storage?

Storage by Firevault is a scalable, offline storage system designed to keep enterprise workloads out of reach from breaches, ransomware, and credential theft.

Core characteristics:

  • Enterprise capacity: Starting at 8TB, expandable in 8TB steps
  • Offline by default: Physical disconnection, not software controls
  • Full read/write access: Two-way data movement during authorised windows
  • Your hardware: Dedicated infrastructure you legally own

What Storage is NOT

Storage is explicitly not:

  • Not cloud backup or SaaS: No standing connectivity, no shared tenancy
  • Not a data diode or write-only vault: Full two-way access when authorised
  • Not always-online infrastructure: Offline is the default state
  • Not software-only protection: Physical disconnection at the wire level

Who is Storage For?

Storage is designed for organisations that:

  • Hold crown jewel data (IP, customer records, operational systems)
  • Require proven offline backup for compliance or insurance
  • Need recovery assurance independent of production systems
  • Operate in sectors where ransomware is an existential threat

The Problem Storage Solves

Traditional backup fails when attackers have persistent access. Cloud backups can be encrypted alongside production data. Air-gapped tapes require physical logistics. Neither provides rapid, verified recovery.

Storage provides the missing layer: an offline copy that is physically unreachable until you need it, with controlled connectivity for recovery.

The 3-2-1-0 Model

Industry best practice recommends:

  • 3 copies of data
  • 2 different storage types
  • 1 offsite copy
  • 0 online exposure for recovery copy

Storage becomes that '0'. The offline layer that ensures recovery even when everything else is compromised.

How Storage Works

  1. Data ingestion: Connect via API or SFTP during authorised windows
  2. Verification: Data integrity checks confirm successful transfer
  3. Disconnection: Physical isolation until next authorised session
  4. Recovery: Controlled reconnection for data retrieval when needed

Deployment Options

  • Firevault Bunkers: Hosted in our secure colocation facilities
  • On-premise: Deployed in your own data centre
  • Hybrid: Split deployment for geographic resilience

Connectivity Options

Storage supports multiple connectivity methods:

  • REST API for programmatic access
  • SFTP for file-based workflows
  • Scheduled connection windows
  • On-demand session requests

Security and Compliance

Storage supports compliance with:

  • NIST CSF and NIST 800-53
  • ISO/IEC 27001
  • GDPR Article 32
  • NIS2 resilience requirements
  • Sector-specific regulations (FCA, HIPAA, PCI-DSS)

Ownership Model

With Storage, you own the hardware:

  • Legal ownership of systems and data
  • Legal Recovery Assignment documentation
  • No third-party access (not even Firevault when offline)

Pricing

Storage pricing is based on capacity, deployment model, and service level. Enterprise pricing requires a discovery call to assess your specific requirements.

Getting Started

  1. Architecture review: Assess your data protection requirements
  2. Capacity planning: Determine storage requirements
  3. Deployment design: Select location and connectivity
  4. Provisioning: Hardware allocation and configuration
  5. Integration: Connect to your backup workflows

Next Steps

If your organisation needs proven offline storage for crown jewel data, book a technical consultation to discuss your architecture.

Mark Fermor
David Bailey
Kenny Phipps
Online Now
Concierge

Put this guide into practice

Ready to apply what you have learned? Explore how Firevault delivers the offline protection covered in this guide.

Takes about 2 minutes. No account needed.

Free2 minsNo sign-up

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy