Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Setting Expectations

What Offline Secure Storage (OSS)
Is Not

Before you understand what Offline Secure Storage does, it helps to understand what it is not. We are fundamentally different from the tools you may be comparing us to.

OSS is not cloud, not SaaS, not an application. It is offline secure storage: dedicated hardware that is physically disconnected from all networks until you authorise access.

The Fundamental Difference

A side-by-side comparison of how OSS differs from connected storage solutions.

Feature
Others
OSS
Network Connection
Always connected
Disconnected by default
Infrastructure
Shared multi-tenant
Dedicated hardware
Access Control
Software policies
Physical isolation
Attack Surface
Always exposed
Zero when offline
Third-Party Access
Provider employees
Only you
Breach Impact
Mass exposure
Physically impossible
In Detail

What We Are Not

Each of these technologies has its place. But none of them provide physical disconnection.

Not Cloud Storage

Always online means always exposed

Cloud storage keeps your data online and reachable 24/7. That is the opposite of what we do.

Why This Is Risky
  • Data is always connected to the internet
  • Third-party employees can access your files
  • Subject to mass breaches and credential attacks
  • You do not control the physical infrastructure
The OSS Approach

OSS is physically disconnected. Your data exists on dedicated hardware that is offline by default. No internet connection means no attack surface.

Not a Data Diode

One-way recovery versus two-way control

Data diodes and immutable backup vaults are designed for post-breach recovery. OSS prevents the breach from happening.

Why This Is Risky
  • Data flows one way only (write-once, read-never until disaster)
  • Designed for recovery, not active protection of live assets
  • Cannot retrieve files on demand for operational use
  • Does not prevent the breach, only survives it
The OSS Approach

OSS is pre-breach prevention with two-way controlled access. Your data is offline and unreachable until you authorise access. Retrieve what you need, when you need it, on your terms.

Not a Network Appliance

Hardware isolation versus network segmentation

Network appliances segment traffic or control connections. OSS removes the connection entirely.

Why This Is Risky
  • Still operates within your network perimeter
  • Relies on software to control access policies
  • Can be bypassed through misconfigurations or exploits
  • The path to your data still exists when enabled
The OSS Approach

OSS is complete physical disconnection, not network segmentation. There is no path to manipulate because the cable is physically unplugged at Layer 1.

Not Traditional Backup

Copying data does not protect it

Backup solutions create copies of data that remains reachable. We remove reachability entirely.

Why This Is Risky
  • Backups are often connected to the network
  • Ransomware can encrypt backups too
  • Recovery assumes you detected the breach
  • Does not prevent the breach, only recovers from it
The OSS Approach

OSS is pre-breach protection, not post-breach recovery. Your most sensitive data is stored where attackers cannot reach it in the first place.

Not Immutable Storage

Write-once versus controlled access

Immutable storage locks data to prevent tampering. But locked data you cannot access operationally is not useful for business-critical assets.

Why This Is Risky
  • Data becomes read-only and inaccessible for updates
  • Designed for compliance archives, not operational use
  • Still connected to the network infrastructure
  • Immutability is enforced by software, not physics
The OSS Approach

OSS provides controlled access to live assets. Modify, update, and retrieve your data when needed. Protection comes from physical disconnection, not locking you out of your own files.

Not File Sharing

Collaboration versus protection

File sharing platforms prioritise easy access and collaboration. We prioritise controlled protection.

Why This Is Risky
  • Designed for convenience, not security
  • Shared links can be forwarded or leaked
  • No physical isolation from corporate networks
  • Access controls are software-based
The OSS Approach

OSS provides controlled access on your terms. Physical disconnection means access only happens when you explicitly authorise it.

Not a VPN or Firewall

Protecting the path versus removing it

VPNs and firewalls protect network paths. We remove the network path entirely.

Why This Is Risky
  • Still relies on software-controllable defences
  • Misconfiguration creates vulnerabilities
  • Zero-day exploits can bypass protections
  • The path to your data still exists
The OSS Approach

OSS takes a fundamentally different approach. If there is no network path to your data, there is nothing to protect or misconfigure.

Not a Password Manager

Credentials versus critical assets

Password managers store login credentials. We store irreplaceable documents and sensitive data.

Why This Is Risky
  • Focused on authentication, not data storage
  • Master password is a single point of failure
  • Cloud-synced password vaults can be breached
  • Not designed for large files or documents
The OSS Approach

OSS is a digital safe deposit box for your most sensitive assets: contracts, wills, intellectual property, evidence, and files that cannot be recreated.

Not an Application or SaaS

Software versus hardware isolation

SaaS applications run on shared infrastructure with software-based security. We use physical hardware isolation.

Why This Is Risky
  • Multi-tenant environments share resources
  • Software vulnerabilities affect all users
  • Provider has access to your data
  • If the provider is breached, you are breached
The OSS Approach

OSS is dedicated hardware, not a software layer. Your data lives on your own isolated storage that only you can access.

What We Are

OSS Is an Offline Secure Storage Platform for Data

A dedicated hardware platform for your customer, commercial, confidential, and crown jewel data. Physically disconnected from all networks, accessible only when you authorise connection.

Physical Disconnection

No network path means no attack surface

Dedicated Hardware

Your own isolated storage, not shared infrastructure

Identity Verified

KYC/AML at onboarding, MFA at every session

Mark Fermor
David Bailey
Kenny Phipps
Online Now
Concierge

Understand what OSS actually does

Take two minutes to see whether offline secure storage is the right fit for your data protection needs.

Takes about 2 minutes. No account needed.

Free2 minsNo sign-up

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy