Our Cyber Recovery Solutions
Failover Technology
designed for ICS & OT
30-Second Recovery
from Cyber-Attack
Reduced Risks of Data Loss
Easy Validation of the Data Integrity
Cyber-Incident Recovery Platform
Cyber-Incident Recovery Platform
With the exponential increase in cyber-attack rates on critical assets, breaches have become unavoidable. Downtime results in significant economic loss, damage to corporate reputation, and risk to human lives.
Cyber response measures have become a must.
Reduce downtime in critical infrastructures from days and weeks to minutes for complete and instant recovery!
Reduce downtime in critical infrastructures from days and weeks to minutes for complete and instant recovery!
The solution includes a Cyber Recovery Unit (CRU), including 3 NVMe disks that perform backups of the entire disk:
OS, Licensing, configurations, and data files.
The CRU is connected to an end-point, with only one NVMe disk connected at any given moment. The other 2 disks are securely isolated from any external connection. Once attacked, use a one-click activation to a fully automated recovery process
-
512GB - 4TB optional
-
On-prem air-gapped technology
-
Easily activated. No IT knowledge is needed.
-
Reduce risk for attack by safe and easy patching
-
Honey pots for malware detection
Why Salvador Technologies?
Our solution enhances cyber resilience and ensures operational continuity.
By helping to apply corporate risk policies, it enables verifying compliance through RTO requirements and gives you full visibility of backup status per end-point.
-
Restoration tests and easily retrievable data
-
Enterprise policy compliance
Cyber Recovery Product Portfolio
Cyber Recovery Unit
This Instant Recovery Unit provides the full and fastest recovery from ransomware.
• Full recovery from cyber-attacks
• 2 Minutes installation
• 30 seconds recovery
• Offline protection
• Press one button for recovery
Cyber Recovery Monitoring System
Monitoring system stored on cloud or on-prem, providing full visibility of the entire operations, per end station:
System health, Missing devices, Attacks detected. It can also be integrated into SOC. Notifications and alerts are also available via email/SMS.
Revolutionized patented air-gap solution
Our Cyber
Recovery Technology
Operational Downtime Prevention
Instant Restoration
Reduced Risks of Data Loss
Easy Validation of the Data Integrity
The Air-Gapped Technology
The algorithm will not allow any external or internal control of this functionality from the computer.
It means that every X days, a different disk will be accessible to the user for backup of the data – other disks are electronically offline.
Our data loss prevention tools are easy to use – less than 1 minute of installation in order to protect the data from malicious encryption.
It requires only 30 seconds to return the system back to work in case of a cyber-attack or system malfunction.
Our patented technology provides data security and automates the entire recovery process through an easy retrievable platform in a single click.
What's your plan for
an unplanned downtime?
Our business continuity solutions provide revolutionized patented air-gapped technology that dramatically reduces the risks of data loss and operational downtime and, most importantly - an easy validation of the backup integrity with an instant restoration test. Our product portfolio guarantees the highest levels of data protection and instant recovery.
We understand that recovery time is highly critical for our customers and their business continuity.
Data disaster recovery is essential for companies with non-stop production, 24-hours monitoring systems, critical infrastructures, logistics operations, medical equipment, or other critical assets.
Our data loss prevention tools are easy to use and require only 30 seconds to return the system to work in case of a cyber-attack or system malfunction.
Cyber Recovery Unit
For workstations, our Cyber Recovery Unit solution consists of:
-
A Hardware unit to store the data and protect it from any corruption.
-
A Software Agent to perform dedicated data copy and anomaly inspection.
-
A Centralized Monitoring System to inform the user and display the status of each station.
In order to ensure operational continuity, the product should be installed in advance (before an attack happens). If possible, we advise performing the first installation (Factory Reset version) on a clean operational environment – after the computer is fully configured and contains no viruses (i.e., before internet connection). We suggest installing on the
most critical workstations in the organization – thus, that requires continuous operation and fast recovery.
Our cyber recovery products and services comply with
-
What makes your recovery solution so fast?Our advanced backup software creates a full duplicate of the system, which includes the OS (Operating System), data files, drivers, and the unique user configuration. The attacker cannot reach, encrypt, or delete the data, as it is secured by air-gap protection. This allows the user to immediately reboot and operate from Salvador's disk, with no need for IT expertise, by one click of a button.
-
Any solution for petabytes of data storage?Most of the critical assets can use our Cyber Recovery Unit (CRU) units for immediate recovery. For large capacity servers and private clouds, we have the Network Recovery Station (NRS) based on the DPU network adapter. This product is not limited by the capacity of your data.
-
How do you avoid a backup of the virus?We do continuous monitoring of the data of both the computer and the backups data. This allows us to immediately identify attempts of attacks, and inform the user to take an action.
-
How do I perform recovery exercises for my company?It is easy and will not require you to shut down your workstation. All you need to do is to plug off the unit from the workstation and then you can test the recovery process on a different computer (by booting from Salvador device, the whole process takes approximately 30 seconds).
-
What about the APT virus?One copy of the data is never accessible before recovery to avoid APT virus infection. The two other copies are secured by a patented offline protection algorithm. Access to the data in those copies is time-limited and allowed only to dedicated Salvador software. The disks are invisible by the OS.
-
How to deal with APT virus?To prevent APT attacks, you have the option to limit device access, require strong passwords for users, secure assets, and maintain vital information. To keep clear of APT attacks, we like to keep one copy of the data inaccessible prior to recovery. The two other copies are secured by a patented offline protection algorithm. Access to the data in those copies is time-limited and allowed only to dedicated Salvador software. The disks are invisible by the OS.
-
How does it differ from a DR system?Yes. DR (Disaster Recovery) is designed specifically for data loss in cases such as fire, water, physical theft. These are usually online solutions that are vulnerable to cyber-attacks. Salvador's solution is based on air-gapped protection storage to allow recovery from ransomware, wiper malware, and other types of cyberattacks.
-
I have many end-computers in my organization, how can I deploy your product?The deployment is very easy. The installation takes less than one minute per station. It means you can deploy hundreds of systems in a few hours.
-
How do I perform a backup validation?With our simple-to-use web monitoring system, you can see the status of all workstations in one management panel on the cloud or on-premise (in case no internet connection exists).
-
Are there more backups recommended?The more backups, the better! We recommend the 3-2-1 process, for example. First, create a single primary backup, then two additional copies of the data. Next, save backups to two different types of media solutions. Lastly, keep at least one backup file offsite in a different location.
-
What is air-gap protection?Air-gap protection is a security measure for computer networks that physically isolates their private information from the public Internet. A key advantage of this technology over other cloud solutions is that the data is offline, vastly decreasing the risk of malware and ransomware attacks. Air-gap technology is highly relevant to OT because the system protects critical information from potential attacks, dramatically reducing the risks of data loss and operational downtime.
-
Which disaster scenario can be resolved with Salvador Technologies' solution?There are many disaster situations we can help you with! We specialize in ransomware attacks, WIPER attacks (disk erasure), physical disk damage, software glitches, and more. Our simple-to-use web monitoring system, allows you to see the status of all workstations in one management panel, on the cloud or on-premise.