Our Cyber Recovery Solutions
Failover Technology
designed for ICS & OT
30-Second Recovery
from Cyber-Attack
Reduced Risks of Data Loss
Easy Validation of the Data Integrity
Cyber-Incident Recovery Platform
Cyber-Incident Recovery Platform
With the exponential increase in cyber-attack rates on critical assets, breaches have become unavoidable. Downtime results in significant economic loss, damage to corporate reputation, and risk to human lives.
Cyber response measures have become a must.
Reduce downtime in critical infrastructures from days and weeks to minutes for complete and instant recovery!
Reduce downtime in critical infrastructures from days and weeks to minutes for complete and instant recovery!
The solution includes a Cyber Recovery Unit (CRU), including 3 NVMe disks that perform backups of the entire disk:
OS, Licensing, configurations, and data files.
The CRU is connected to an end-point, with only one NVMe disk connected at any given moment. The other 2 disks are securely isolated from any external connection. Once attacked, use a one-click activation to a fully automated recovery process
-
512GB - 4TB optional
-
On-prem air-gapped technology
-
Easily activated. No IT knowledge is needed.
-
Reduce risk for attack by safe and easy patching
-
Honey pots for malware detection
Why Salvador Technologies?
Our solution enhances cyber resilience and ensures operational continuity.
By helping to apply corporate risk policies, it enables verifying compliance through RTO requirements and gives you full visibility of backup status per end-point.
-
Restoration tests and easily retrievable data
-
Enterprise policy compliance
Cyber Recovery Product Portfolio
Cyber Recovery Unit
This Instant Recovery Unit provides the full and fastest recovery from ransomware.
​
• Full recovery from cyber-attacks
• 2 Minutes installation
• 30 seconds recovery
• Offline protection
• Press one button for recovery
Cyber Recovery Monitoring System
Monitoring system stored on cloud or on-prem, providing full visibility of the entire operations, per end station:
System health, Missing devices, Attacks detected. It can also be integrated into SOC. Notifications and alerts are also available via email/SMS.
Revolutionized patented air-gap solution
Our Cyber
Recovery Technology
Operational Downtime Prevention
Instant Restoration
Reduced Risks of Data Loss
Easy Validation of the Data Integrity
The Air-Gapped Technology
The algorithm will not allow any external or internal control of this functionality from the computer.
It means that every X days, a different disk will be accessible to the user for backup of the data – other disks are electronically offline.
Our data loss prevention tools are easy to use – less than 1 minute of installation in order to protect the data from malicious encryption.
​
It requires only 30 seconds to return the system back to work in case of a cyber-attack or system malfunction.
Our patented technology provides data security and automates the entire recovery process through an easy retrievable platform in a single click.
What's your plan for
an unplanned downtime?
Our business continuity solutions provide revolutionized patented air-gapped technology that dramatically reduces the risks of data loss and operational downtime and, most importantly - an easy validation of the backup integrity with an instant restoration test. Our product portfolio guarantees the highest levels of data protection and instant recovery.
We understand that recovery time is highly critical for our customers and their business continuity.
​
Data disaster recovery is essential for companies with non-stop production, 24-hours monitoring systems, critical infrastructures, logistics operations, medical equipment, or other critical assets.
​
Our data loss prevention tools are easy to use and require only 30 seconds to return the system to work in case of a cyber-attack or system malfunction.
Cyber Recovery Unit
For workstations, our Cyber Recovery Unit solution consists of:
-
A Hardware unit to store the data and protect it from any corruption.
-
A Software Agent to perform dedicated data copy and anomaly inspection.
-
A Centralized Monitoring System to inform the user and display the status of each station.
In order to ensure operational continuity, the product should be installed in advance (before an attack happens). If possible, we advise performing the first installation (Factory Reset version) on a clean operational environment – after the computer is fully configured and contains no viruses (i.e., before internet connection). We suggest installing on the
most critical workstations in the organization – thus, that requires continuous operation and fast recovery.