
OT & ICS Cyber Backup and Recovery Platform

Failover Technology
designed for ICS & OT

Instant Recovery
from Cyber-Attack

Validation of the Data Integrity

With the exponential rise in cyber-attack rates on critical assets, breaches have become inevitable. Downtime results in major financial losses, reputational damage, and risks to human lives.
Cyber response measures have become essential.
Reduce downtime in critical infrastructure from days or weeks to just minutes with complete and instant recovery!

.webp)
Why do you need an OT focused Backup & Recovery Solution?
Most OT-based cybersecurity tools today focus on detection and prevention. We prioritize response and fast recovery, bridging the gap between cybersecurity and business continuity. Our resilience-focused solution complements existing detection platforms, closing the loop to ensure business and operational continuity.
Key benefits:
-
Fast response & recovery – Safe, reliable restoration of business operations to prevent painful losses.
-
Comprehensive visibility – Designed to monitor and manage all sites and stations from a single, simplified control panel and reporting system.
-
User-friendly design – Built for all roles; no IT expertise, staff, or specialized skills are required to resume operations.
In the event of a cyberattack or incident, the fear of damage or financial loss is eliminated.


Cyber Recovery Unit
The Cyber Recovery Unit (CRU) is a patent-based hardware-based backup unit specially designed for OT and ICS landscapes to secure immediate recovery and backup integrity.
For workstations, our CRU provides:
-
Instant recovery in minutes
-
Dedicated hardware-based redundancy for critical HMI and engineering stations.
-
Supports OT legacy operating systems
-
Optimized for isolated OT environments
-
Operates independently from the network
-
Immutable backup
-
Bootable copy
When a cyber attack occurs, the CRU enables recovery within minutes. How? All it takes is to switch from backup mode to recovery mode, which is done with a simple flick of a button.
You’ll be back up and running within minutes – a significant improvement over other solutions that may take up to hours or even days.


A Compliance-First Approach
Our simplified, easy-to-use solution is designed, first and foremost, to focus on securing operational continuity.
With great attention to corporate risk policies and RTO requirements, it ensures you remain compliant while providing full visibility into the backup status of every endpoint.
-
Restoration tests and easily retrievable validated data
-
Enterprise-wide policy compliance
-
Backup integrity verification



Our cyber recovery products and services comply with

-
What makes your recovery solution so fast?Our advanced backup software creates a full duplicate of the system, including the OS (Operating System), data files, drivers, and unique user configuration. Thanks to our secure air-gap protection, attackers cannot reach, encrypt, or delete the data. This allows users to immediately reboot and operate from Salvador's disk, with no need for IT expertise. Just one click of a button is all it takes.
-
Any solution for petabytes of data storage?Most of the critical assets can use our Cyber Recovery Unit (CRU) units for immediate recovery. For large capacity servers and private clouds, we have the Network Recovery Station (NRS) based on the DPU network adapter. This product is not limited by the capacity of your data.
-
How do you avoid a backup of the virus?We do continuous monitoring of the data of both the computer and the backups data. This allows us to immediately identify attempts of attacks, and inform the user to take an action.
-
How do I perform recovery exercises for my company?It is easy and will not require you to shut down your workstation. All you need to do is to plug off the unit from the workstation and then you can test the recovery process on a different computer (by booting from Salvador device, the whole process takes approximately 30 seconds).
-
What about the APT virus?One copy of the data is never accessible before recovery to avoid APT virus infection. The two other copies are secured by a patented offline protection algorithm. Access to the data in those copies is time-limited and allowed only to dedicated Salvador software. The disks are invisible by the OS.
-
How to deal with APT virus?To prevent APT attacks, you have the option to limit device access, require strong passwords for users, secure assets, and maintain vital information. To keep clear of APT attacks, we like to keep one copy of the data inaccessible prior to recovery. The two other copies are secured by a patented offline protection algorithm. Access to the data in those copies is time-limited and allowed only to dedicated Salvador software. The disks are invisible by the OS.
-
How does it differ from a DR system?Yes. DR (Disaster Recovery) is designed specifically for data loss in cases such as fire, water, physical theft. These are usually online solutions that are vulnerable to cyber-attacks. Salvador's solution is based on air-gapped protection storage to allow recovery from ransomware, wiper malware, and other types of cyberattacks.
-
I have many end-computers in my organization, how can I deploy your product?The deployment is very easy. The installation takes less than one minute per station. It means you can deploy hundreds of systems in a few hours.
-
How do I perform a backup validation?With our simple-to-use web monitoring system, you can see the status of all workstations in one management panel on the cloud or on-premise (in case no internet connection exists).
-
Are there more backups recommended?The more backups, the better! We recommend the 3-2-1 process, for example. First, create a single primary backup, then two additional copies of the data. Next, save backups to two different types of media solutions. Lastly, keep at least one backup file offsite in a different location.
-
What is air-gap protection?Air-gap protection is a security measure for computer networks that physically isolates their private information from the public Internet. A key advantage of this technology over other cloud solutions is that the data is offline, vastly decreasing the risk of malware and ransomware attacks. Air-gap technology is highly relevant to OT because the system protects critical information from potential attacks, dramatically reducing the risks of data loss and operational downtime.
-
Which disaster scenario can be resolved with Salvador Technologies' solution?There are many disaster situations we can help you with! We specialize in ransomware attacks, WIPER attacks (disk erasure), physical disk damage, software glitches, and more. Our simple-to-use web monitoring system, allows you to see the status of all workstations in one management panel, on the cloud or on-premise.