Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Control Module

FV-Transfer: Controlled Data Movement

Physical isolation is only practical when data can still move between zones in a controlled manner. Transfer provides verified, time-bound conduits that physically disconnect after each operation, maintaining isolation while enabling operational data flows.

Back to Control
Control

Control Module

Physical isolation is worthless if you maintain an always-on data pipe between zones. Transfer provides the data movement your operations need without the persistent paths your attackers exploit.

Verified

Cryptographic integrity check on every data transfer

Time-bound

Conduits physically disconnect after each operation

One-way

Directional control prevents reverse-path exploitation

100%

Transfer activity logged on tamper-proof storage

The Problem

Data movement between zones creates the paths attackers follow.

Persistent Data Paths

Traditional data movement relies on always-on network connections between zones. These connections become attack paths that undermine the segmentation they cross.

Unverified Transfers

Data moving between zones is rarely verified for integrity. Malware can hitchhike on legitimate data transfers, moving from compromised zones to clean zones.

Open-Ended Connections

File transfer connections remain active far longer than the actual transfer requires, creating extended windows of cross-zone exposure.

The Scenario

Scenario: Secure OT Data Transfer for Monitoring

A power utility needs to send SCADA telemetry data from the OT network to the IT network for monitoring dashboards every 15 minutes. A persistent connection would undermine the physical IT/OT boundary. With Transfer, a one-way conduit activates every 15 minutes, sends the telemetry data from OT to IT, verifies the data integrity, and physically disconnects. The conduit is one-directional — data flows from OT to IT only. There is no return path that an attacker on the IT network could exploit to reach the OT environment. The entire transfer takes seconds, and the conduit is physically disconnected for the remaining 14 minutes and 50 seconds.

"We needed monitoring data from OT every 15 minutes. A persistent connection would have destroyed our air gap. Transfer gave us the data flow without the risk."

Module Overview

Data movement without persistent cross-zone risk.

FV-Transfer enables controlled data flows between physically isolated zones. Each transfer is verified for integrity, confined to a time-bound conduit, and logged on tamper-proof storage. Between transfers, no cross-zone path exists.

  • Time-bound conduits that physically disconnect after each transfer
  • Directional control preventing reverse-path exploitation
  • Cryptographic integrity verification on every transfer
  • Malware scanning before data enters the target zone
  • Multi-party authorisation for sensitive transfers
  • Complete transfer audit trail on disconnected storage
Transfer

Transfer — How It Works

Module 1 of 4

Transfer establishes controlled, time-bound conduits between physically isolated zones. Data is verified for integrity at both ends. The conduit physically disconnects after each transfer operation. Directional controls ensure data flows only in the authorised direction.

Featured In

TechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in EssexTechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in Essex

Key Capabilities

Directional Control

Transfers can be configured as one-way (OT to IT only) or bidirectional with independent authorisation for each direction. Reverse-path exploitation is eliminated.

Integrity Verification

Every transferred item is cryptographically hashed at source and verified at destination. Tampered or corrupted data is rejected before entering the target zone.

Time-Bound Conduits

Physical conduits activate for the duration of the transfer and sever automatically on completion. No persistent cross-zone path exists.

Malware Scanning

Transferred data passes through integrity and content verification before entering the target zone, preventing malware from hitchhiking on legitimate transfers.

Multi-Party Authorisation

Sensitive transfers require approval from multiple authorised parties before the conduit is activated.

Transfer Audit Trail

Every transfer operation, integrity check result, and conduit activation is logged on physically disconnected storage.

Demo to Live

Adoption Guide

Step 1

Data Flow Audit

Map all data flows that cross zone boundaries, documenting volume, frequency, direction, and the systems involved at each end.

Step 2

Conduit Design

Define conduit specifications for each data flow including direction, schedule, integrity requirements, and authorisation policies.

Step 3

Non-Critical Flow Pilot

Deploy Transfer on a non-critical data flow, testing conduit activation, integrity verification, and automatic severance.

Step 4

Full Data Flow Governance

Extend to all cross-zone data flows with automated scheduling, continuous integrity verification, and compliance reporting.

Step 1

Data Flow Audit

Map all data flows that cross zone boundaries, documenting volume, frequency, direction, and the systems involved at each end.

Step 2

Conduit Design

Define conduit specifications for each data flow including direction, schedule, integrity requirements, and authorisation policies.

Step 3

Non-Critical Flow Pilot

Deploy Transfer on a non-critical data flow, testing conduit activation, integrity verification, and automatic severance.

Step 4

Full Data Flow Governance

Extend to all cross-zone data flows with automated scheduling, continuous integrity verification, and compliance reporting.

Questions

Frequently Asked

Ready to take the next step?

See how Control can govern your data paths with physical enforcement no software exploit can bypass.

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy