FV-Vault: Encrypted Offline Storage
Critical data — recovery copies, configurations, crown jewels — must exist beyond the reach of network-based attacks. Vault provides encrypted, physically disconnected storage that ensures your most important assets remain intact regardless of what happens on your network.
Control Module
You cannot protect data from network attacks by putting it on a different part of the network. Physical disconnection is the only storage protection that an attacker on your network cannot reach.
Air-gapped
Physically disconnected from all network infrastructure
AES-256
Encryption at rest with hardware key management
Zero
Network paths to stored data during isolation periods
Verified
Cryptographic integrity on every retrieval
Network-connected storage is network-accessible to attackers.
Backup Encryption
Ransomware specifically targets backup infrastructure. Network-connected backups, including cloud backups, are encrypted alongside production data, eliminating the primary recovery mechanism.
Immutability Bypasses
Immutable storage solutions still require network connectivity for management. If an attacker reaches the management interface, immutability settings can be overridden or the storage controller compromised.
Cloud Storage Risks
Cloud storage depends on credential security. Compromised cloud credentials or a misconfigured access policy can expose backup data to exfiltration or destruction.
The Scenario
Scenario: Air-Gapped Recovery After Total Encryption
A financial services firm experiences a ransomware attack that encrypts all production systems, including the primary backup server and the cloud-replicated copies. The attackers had compromised the backup administrator's credentials three weeks earlier and used them to delete cloud snapshots and encrypt the on-premises backup appliance. With Vault, the firm's critical data — database backups, system configurations, and regulatory records — exists on physically disconnected, encrypted storage. The ransomware never reached it because there was no network path to traverse. Recovery begins within hours using the Execute module, with cryptographic verification of every restored asset.
"They encrypted our production, our backups, and our cloud replicas. The only copies they did not reach were in the Vault, because there was no network path for them to follow."
Data protection through physical disconnection.
FV-Vault provides encrypted, air-gapped storage that keeps critical data beyond the reach of any network-based attack. Combined with controlled transfer windows, cryptographic integrity verification, and multi-party access governance, Vault ensures that your most important assets remain available for recovery regardless of what happens on your network.
- Physically disconnected storage beyond network reach
- AES-256 encryption with hardware key management
- Cryptographic integrity verification on every retrieval
- Controlled, time-bound transfer windows
- Multi-party authorisation for all access operations
- Configurable retention policies for regulatory compliance
Vault — How It Works
Module 1 of 4Vault stores encrypted data on physically disconnected infrastructure. Data is transferred during controlled windows through the Transfer module, encrypted with AES-256 using hardware key management, and verified with cryptographic hashes. Between transfer windows, no network path to the stored data exists.
Key Capabilities
Physical Disconnection
Vault storage is physically disconnected from all network infrastructure. No network path, logical or physical, exists between Vault and production systems during isolation periods.
AES-256 Encryption
All data stored in Vault is encrypted at rest using AES-256 with hardware-managed keys. Even physical access to the storage media yields nothing without the encryption keys.
Cryptographic Integrity
Every data asset stored in Vault is hashed at ingestion. On retrieval, the hash is verified to confirm the data has not been tampered with or corrupted.
Controlled Transfer Windows
Data moves into and out of Vault through time-bound, policy-controlled windows. The transfer conduit physically disconnects after each operation.
Immutable Access Logs
Every transfer, retrieval, and access attempt is logged on physically disconnected storage that cannot be modified by any network-connected user or system.
Regulatory Retention
Vault supports configurable retention policies that meet GDPR, NIS2, DORA, and industry-specific data retention requirements.
Demo to Live
Adoption Guide
Critical Data Inventory
Identify all data assets that require air-gapped protection: recovery copies, configurations, regulatory records, and organisational crown jewels.
Vault Architecture Design
Define storage capacity, encryption requirements, transfer schedules, retention policies, and multi-site replication needs.
Initial Data Ingestion
Transfer critical data to Vault through controlled windows, verify cryptographic integrity, and validate retrieval procedures.
Operational Integration
Automate transfer schedules, integrate with Execute for recovery orchestration, and establish ongoing integrity verification procedures.
Critical Data Inventory
Identify all data assets that require air-gapped protection: recovery copies, configurations, regulatory records, and organisational crown jewels.
Vault Architecture Design
Define storage capacity, encryption requirements, transfer schedules, retention policies, and multi-site replication needs.
Initial Data Ingestion
Transfer critical data to Vault through controlled windows, verify cryptographic integrity, and validate retrieval procedures.
Operational Integration
Automate transfer schedules, integrate with Execute for recovery orchestration, and establish ongoing integrity verification procedures.
Questions
Frequently Asked
Ready to take the next step?
See how Control can govern your data paths with physical enforcement no software exploit can bypass.