Our Solutions
Failover Technology
designed for ICS & OT
30-Second Recovery
from Cyber-Attack
Reduced Risks of Data Loss
Easy Validation of the Data Integrity
The offense is always
one step ahead of defense.
With the exponentially increase in cyber-attack rates on critical assets, breaches have become unavoidable. Downtime results in significant economic loss, damage to corporate reputation, and risk to human lives.
Cyber response measures have become a must.
Reduce downtime in critical infrastructures from days and weeks to minutes for complete and instant recovery!
The solution includes a Cyber Recovery Unit (CRU), including 3 NVMe disks that perform backups of the entire disk:
OS, Licensing, configurations, and data files.
The CRU is connected to an end-point, with only one NVMe disk connected at any given moment. The other 2 disks are securely isolated from any external connection. Once attacked, use a one-click activation to a fully automated recovery process
-
512GB - 4TB optional
-
On-prem air-gapped technology
-
Easily activated. No IT knowledge is needed.
-
Reduce risk for attack by safe and easy patching
-
Honey pots for malware detection
Why Salvador Technologies?
Our solution enhances cyber resilience and ensures operational continuity.
By helping to apply corporate risk policies, it enables verifying compliance through RTO requirements and gives you full visibility of backup status per end-point.
-
Restoration tests and easily retrievable data
-
Enterprise policy compliance
Product Portfolio
Cyber Recovery Unit
This Instant Recovery Unit provides the full and fastest recovery from ransomware.
​
• Full recovery from cyber-attacks
• 2 Minutes installation
• 30 seconds recovery
• Offline protection
• Press one button for recovery
Monitoring system
This Instant Recovery Unit provides the full and fastest recovery from ransomware.
​
• Full recovery from cyber-attacks
• 2 Minutes installation
• 30 seconds recovery
• Offline protection
• Press one button for recovery
Revolutionized patented air-gap solution
Our Technology
Operational Downtime Prevention
Instant Restoration
Reduced Risks of Data Loss
Easy Validation of the Data Integrity
The Air-Gapped Technology
The algorithm will not allow any external or internal control of this functionality from the computer.
It means, that every X days, a different disk will be accessible to the user for backup of the data – other disks are electronically offline.
Our data loss prevention tools are easy to use – less than 1 minute of installation in order to protect the data from malicious encryption.
​
It requires only 30 seconds to return the system back to work in case of a cyber-attack or system malfunction.
Our patented technology provides data security and automates the entire recovery process through an easy retrievable platform in a single click.
What's your plan for
an unplanned downtime?
Our business continuity solutions provide revolutionized patented air-gapped technology that dramatically reduces the risks of data loss and operational downtime and, most importantly - an easy validation of the backup integrity with an instant restoration test. Our product portfolio guarantees the highest levels of data protection and instant recovery.
We understand that recovery time is highly critical for our customers and their business continuity.
​
Data disaster recovery is essential for companies with non-stop production, 24-hours monitoring systems, critical infrastructures, logistics operations, medical equipment, or other critical assets.
​
Our data loss prevention tools are easy to use and require only 30 seconds to return the system to work in case of a cyber-attack or system malfunction.
Cyber Recovery Unit
For workstations, our Cyber Recovery Unit solution consists of:
1. A Hardware unit to store the data and protect it from any corruption.
2. A Software Agent to perform dedicated data copy and anomaly inspection.
3. A Centralized Monitoring System to inform the user and display the status of each station.
In order to ensure operational continuity, the product should be installed in advance (before an attack happens). If possible, we advise, performing the first installation (Factory Reset version) on a clean operational environment – after the computer is fully configured and contains no viruses (i.e., before internet connected). We suggest installing on the
most critical workstations in the organization – thus, that requires continuous operation and fast recovery.