Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Control Module

FV-Archive: Immutable Offline Retention

Audit trails, regulatory evidence, and forensic records must be beyond the reach of anyone who might want to alter them. Archive stores evidence on physically disconnected media, making tampering impossible regardless of who attempts it.

Back to Control
Control

Control Module

If the person who committed the act can reach the evidence of that act, your audit trail is worthless. Physical disconnection ensures the evidence remains intact regardless of who wants it destroyed.

Immutable

Evidence stored on write-once, physically disconnected media

Zero

Network paths to archived evidence during retention

Compliant

Meets GDPR, NIS2, DORA, and ISO 27001 retention requirements

Verified

Cryptographic integrity on every retrieval

The Problem

Evidence you cannot protect is evidence you cannot use.

Log Tampering

Attackers who compromise systems routinely delete or modify logs to cover their tracks. Network-connected logging infrastructure is a high-priority target during any breach.

Regulatory Evidence Loss

Compliance records stored on network-accessible systems can be accidentally deleted, intentionally destroyed, or encrypted by ransomware, leaving organisations unable to demonstrate compliance.

Chain of Custody Gaps

Evidence that has been stored on systems accessible to the individuals under investigation cannot maintain a defensible chain of custody for legal or disciplinary proceedings.

The Scenario

Scenario: Tamper-Proof Evidence After Insider Incident

A senior database administrator is suspected of exfiltrating customer records. The internal investigation team needs to review database access logs, query histories, and data export records. The administrator, aware of the investigation, attempts to delete relevant logs from the SIEM and modify database audit trails. With Archive, all database access logs and session recordings are stored on physically disconnected media from the moment they are generated. The administrator has no network path to the archived evidence. The investigation proceeds with a complete, tamper-proof record of every query, export, and access event.

"Without Archive, the suspect would have destroyed the evidence before we could preserve it. The logs on the SIEM were modified within hours of the investigation starting. The Archive copies were untouchable."

Module Overview

Evidence that cannot be tampered with, by anyone.

FV-Archive provides immutable, physically disconnected storage for audit trails, compliance evidence, and forensic records. Write-once media, physical disconnection, and multi-party retrieval ensure that evidence remains intact regardless of who wants it destroyed.

  • Physically disconnected, write-once evidence storage
  • Multi-party authorisation for all evidence retrieval
  • Cryptographic integrity verification on every access
  • Configurable retention meeting all major regulatory frameworks
  • Defensible chain of custody for legal proceedings
  • Automated compliance reporting for audit
Archive

Archive — How It Works

Module 1 of 4

Archive captures audit trails, session recordings, and compliance evidence and stores them on physically disconnected, write-once media. Once written, the evidence cannot be modified, deleted, or accessed from any network-connected system. Retrieval requires multi-party authorisation and physical access procedures.

Featured In

TechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in EssexTechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in Essex

Key Capabilities

Write-Once Storage

Evidence is written to media that does not support modification or deletion. Once recorded, the evidence is permanent.

Physical Disconnection

Archived evidence exists on physically disconnected infrastructure with no network path from any connected system.

Multi-Party Retrieval

Accessing archived evidence requires authorisation from multiple designated parties, maintaining chain of custody and preventing unauthorised access.

Cryptographic Integrity

Every archived item is hashed at ingestion. On retrieval, integrity is verified against the original hash to confirm no tampering has occurred.

Configurable Retention

Retention periods are configured per evidence type, meeting GDPR data minimisation, NIS2 incident reporting, and industry-specific regulatory requirements.

Compliance Reporting

Automated reports document archived evidence types, retention compliance, integrity verification results, and access history for regulatory audit.

Demo to Live

Adoption Guide

Step 1

Evidence Inventory

Identify all audit trails, compliance records, and forensic evidence that require immutable, tamper-proof storage.

Step 2

Retention Policy Design

Define retention periods, ingestion schedules, multi-party retrieval requirements, and destruction procedures for each evidence type.

Step 3

Initial Evidence Ingestion

Transfer existing audit trails and compliance records to Archive, verify cryptographic integrity, and test retrieval procedures.

Step 4

Continuous Evidence Capture

Automate evidence ingestion from all governed systems with continuous integrity verification and compliance reporting.

Step 1

Evidence Inventory

Identify all audit trails, compliance records, and forensic evidence that require immutable, tamper-proof storage.

Step 2

Retention Policy Design

Define retention periods, ingestion schedules, multi-party retrieval requirements, and destruction procedures for each evidence type.

Step 3

Initial Evidence Ingestion

Transfer existing audit trails and compliance records to Archive, verify cryptographic integrity, and test retrieval procedures.

Step 4

Continuous Evidence Capture

Automate evidence ingestion from all governed systems with continuous integrity verification and compliance reporting.

Questions

Frequently Asked

Ready to take the next step?

See how Control can govern your data paths with physical enforcement no software exploit can bypass.

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy