PLATFORM AND TECHNOLOGY


Goldilock technology is built on three core premises:
1

Users need access to their sensitive data quickly, but only occasionally and for short periods of time. Otherwise, online data is more useful to hackers than rightful owners.

2

Sensitive data must be isolated, secured from physical contact and related human error, and fully backed-up.

3

Sensitive data must be quickly accessible when needed.

Goldilock’s patent-pending technology treats these premises as requirements to make sensitive data and IT infrastructure more secure without sacrificing accessibility.

PATENT-PENDING TECH


Relying on a framework of proven technologies and innovative processes, Goldilock delivers a unique security layer to protect digital assets and IT infrastructure that includes:

  • Physical airgap disconnection from access networks
  • Regressive connectivity and non-IP signal processing
  • Biometric gateways
  • Device recognition
  • Personal generated access codes
  • Two-Factor authentication
  • Optional multi-signature security
  • Secure dashboards and live reporting on access and usage

When utilizing Goldilock's SaaS-based offering, the solution also provides the following capabilities:

  • Secured physical vaults
  • Dedicated per-user hardware for processing storage of encrypted data
  • Scalable physically-segregated connectivity solutions
  • Multisite encrypted data backup
  • Fully-insured third-party guarantees for the extraction and delivery of data to owners on demand or in the case of business disruption

Goldilock enhances traditional data and endpoint protection by adding an additional physical layer of security previously unavailable in the market. Our patent-pending solution weaves together a completely new combination of the highest security layers and protocols unknown to hackers – and yet for the user it is uncomplicated.





ACTIVATION PROCESS FLOW




  1. 1. Wallet is stored offline in an encrypted data vault, physically disconnected from the internet.

  2. 2. Using a non-IP mechanism, the user activates their wallet making it accessible over the internet.

  3. 3. User can securely access their wallet over an encrypted connection using a dedicated URL and access credentials.





Your browser is out-of-date!

Update your browser to view this website correctly. Update my browser now

×