factory

VGAP

Keeping legacy systems secure.

Computer software and firmware updates are part of everyday life, but after time, some systems can no longer be updated and are left unsupported and vulnerable to the ever-growing threat of viruses and malware.

This is a major threat when your computer system is vital to your business - for example when running a manufacturing process or operational procedures. Whenever you connect your system to the internet, a network, or transfer information via USB, you risk introducing a foreign threat to your system and business. Results can be catastrophic and expensive.

System Threat

Virtual Ringfencing

Navaho vGap enables the removal and control of this threat, thanks to its ability to create a virtual ringfence around your computer system. Ringfencing technology is known in IT security terms as an AirGap, generally, AirGaps mean physical distance and separation of machines, isolating them entirely - which can be costly, cumbersome, and inconvenient.

However, Navaho vGap offers a highly secure virtual AirGap. Network encryption devices (endpoints) are placed on each system or device on your network which requires protection. The AirGap endpoint creates a secure encrypted network link to a central Navaho vGap Controller, which manages and monitors the endpoints and safely controls network traffic between computers or devices on the Navaho vGap network.

Secure encrypted network

operation

In operational mode, the endpoint establishes a secure connection to the vGap controller and blocks all other inbound or outbound network traffic.

The protected system is now only accessible via the vGap controller, but it can be allowed to access other systems on the network if required.

The protected system can either be accessed via a secured workstation plugged into the secure network port on the vGap controller, or via the web based secure remote access gateway.

config

Initial configuration of the endpoint simple requires it to be plugged into the secure network port of the controller. It will download all network settings and security credentials from the controller and then enter learning mode.

learning

The endpoint is connected between the system or device to be protected and their existing network connection. During learning mode, the endpoint passes all network traffic without blocking anything. Once details of the system to be protected have been gathered, the endpoint can be placed in an opertional mode by the controller.

To find out more on how Navaho can keep your business secure...
Get in touch