Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Control Module

FV-Fracture: Emergency Network Severance

When a breach is detected, every second of continued connectivity is a second the attacker uses to spread. Fracture physically disconnects network segments within seconds, stopping lateral movement by removing the paths it depends on.

Back to Control
Control

Control Module

A firewall rule is a suggestion. Physical disconnection is a fact. When you need containment, you need certainty.

<90s

From authorised command to complete physical disconnection

Zero

Network paths remaining after Fracture activation

100%

Containment assurance — no logical bypass possible

Multi-zone

Simultaneous severance across all configured boundaries

The Problem

Software-based containment fails when attackers control the software.

Firewall Rule Delays

Emergency firewall changes require rule creation, testing, and propagation across multiple devices. Attackers move faster than change management processes allow.

VLAN Hopping

Logical network segmentation can be bypassed through VLAN hopping, ARP spoofing, and misconfigured trunk ports. The separation exists only when every configuration is perfect.

Compromised Controls

If the attacker has reached the management plane, they can modify or disable the same firewall rules and network segmentation you are relying on for containment.

The Scenario

Scenario: Sub-Minute Ransomware Containment

A SOC analyst detects ransomware encryption beginning on a file server at 02:14. The malware is spreading across network segments through SMB shares and has already reached two of four sites. Traditional containment would require isolating VLANs, pushing firewall rules, and disabling switch ports — a process that takes 15-30 minutes while the encryption continues. With Fracture, the SOC analyst issues a single authorised command. Within 90 seconds, all inter-site connections and inter-segment paths are physically severed. The ransomware has no network path to reach the remaining two sites. Encrypted segments are physically isolated for forensic analysis while clean segments begin recovery from air-gapped copies.

"We practised our containment playbook quarterly. It took 22 minutes to execute under ideal conditions. Fracture did it in 87 seconds with no room for human error."

Module Overview

Emergency containment that attackers cannot bypass.

FV-Fracture is the emergency response module of Firevault Control. It provides physical network severance within seconds, absolute containment with no logical bypass, and controlled restoration through the Relay module. When every second counts, Fracture provides the certainty that software-based containment cannot.

  • Physical disconnection that stops all lateral movement
  • Multi-party authorisation preventing accidental activation
  • Sub-minute severance across all configured zones
  • Automated SIEM integration for machine-speed response
  • Controlled, individual path restoration during recovery
  • Tamper-proof logging of all containment actions
Fracture

Fracture — How It Works

Module 1 of 4

Fracture physically removes network connections between configured zones. When activated, the paths between segments cease to exist. There is no firewall to bypass, no VLAN to hop, no configuration to exploit. The physical connection is removed until authorised personnel re-establish it.

Featured In

TechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in EssexTechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in Essex

Key Capabilities

Sub-Minute Severance

Physical disconnection of all configured network zones completes within 90 seconds of an authorised command, regardless of network size or complexity.

Absolute Containment

No logical bypass is possible. The physical connection between network segments is removed, making lateral movement impossible regardless of the attacker's privilege level.

Multi-Party Authorisation

Fracture activation requires authorisation from multiple designated parties, preventing accidental or malicious activation by a single compromised account.

Automated Trigger Integration

Fracture can be triggered automatically by SIEM alerts, SOC playbooks, or custom detection rules, reducing response time from human reaction speed to machine speed.

Full Event Logging

Every activation, the identity of authorising parties, and all subsequent path changes are recorded on tamper-proof, physically disconnected storage.

Controlled Restoration

After containment, paths are restored individually through the Relay module with multi-party authorisation, ensuring no cross-contamination during recovery.

Demo to Live

Adoption Guide

Step 1

Zone Boundary Mapping

Identify every network boundary where emergency severance would be required during an incident, mapping inter-site, inter-segment, and external connections.

Step 2

Authorisation Framework

Define the multi-party authorisation requirements, automated trigger conditions, and escalation procedures for Fracture activation.

Step 3

Tabletop and Live Test

Conduct tabletop exercises followed by live severance tests on non-production segments to validate response times and restoration procedures.

Step 4

Production Deployment

Deploy across all configured zones with SIEM integration, automated triggers for high-confidence detections, and quarterly live testing.

Step 1

Zone Boundary Mapping

Identify every network boundary where emergency severance would be required during an incident, mapping inter-site, inter-segment, and external connections.

Step 2

Authorisation Framework

Define the multi-party authorisation requirements, automated trigger conditions, and escalation procedures for Fracture activation.

Step 3

Tabletop and Live Test

Conduct tabletop exercises followed by live severance tests on non-production segments to validate response times and restoration procedures.

Step 4

Production Deployment

Deploy across all configured zones with SIEM integration, automated triggers for high-confidence detections, and quarterly live testing.

Questions

Frequently Asked

Ready to take the next step?

See how Control can govern your data paths with physical enforcement no software exploit can bypass.

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy