Recent Breaches
Breaches
View All →
Control Module

FV-Vault: Encrypted Offline Storage

Critical data, recovery copies, configurations, crown jewels, must exist beyond the reach of network-based attacks. Vault provides encrypted, physically disconnected storage that ensures your most important assets remain intact regardless of what happens on your network.

Back to Control

Control Module

You cannot protect data from network attacks by putting it on a different part of the network. Physical disconnection is the only storage protection that an attacker on your network cannot reach.

Air-gapped

Physically disconnected from all network infrastructure

AES-256

Encryption at rest with hardware key management

Zero

Network paths to stored data during isolation periods

Verified

Cryptographic integrity on every retrieval

The Problem

Network-connected storage is network-accessible to attackers.

Backup Encryption

Ransomware specifically targets backup infrastructure. Network-connected backups, including cloud backups, are encrypted alongside production data, eliminating the primary recovery mechanism.

Immutability Bypasses

Immutable storage solutions still require network connectivity for management. If an attacker reaches the management interface, immutability settings can be overridden or the storage controller compromised.

Cloud Storage Risks

Cloud storage depends on credential security. Compromised cloud credentials or a misconfigured access policy can expose backup data to exfiltration or destruction.

The Scenario

Scenario: Air-Gapped Recovery After Total Encryption

A financial services firm experiences a ransomware attack that encrypts all production systems, including the primary backup server and the cloud-replicated copies. The attackers had compromised the backup administrator's credentials three weeks earlier and used them to delete cloud snapshots and encrypt the on-premises backup appliance. With Vault, the firm's critical data, database backups, system configurations, and regulatory records, exists on physically disconnected, encrypted storage. The ransomware never reached it because there was no network path to traverse. Recovery begins within hours using the Execute module, with cryptographic verification of every restored asset.

"They encrypted our production, our backups, and our cloud replicas. The only copies they did not reach were in the Vault, because there was no network path for them to follow."

Module Overview

Data protection through physical disconnection.

FV-Vault provides encrypted, air-gapped storage that keeps critical data beyond the reach of any network-based attack. Combined with controlled transfer windows, cryptographic integrity verification, and multi-party access governance, Vault ensures that your most important assets remain available for recovery regardless of what happens on your network.

  • Physically disconnected storage beyond network reach
  • AES-256 encryption with hardware key management
  • Cryptographic integrity verification on every retrieval
  • Controlled, time-bound transfer windows
  • Multi-party authorisation for all access operations
  • Configurable retention policies for regulatory compliance
Vault

Vault, How It Works

Step 1 of 4

Vault stores encrypted data on physically disconnected infrastructure. Data is transferred during controlled windows through the Transfer module, encrypted with AES-256 using hardware key management, and verified with cryptographic hashes. Between transfer windows, no network path to the stored data exists.

Featured In

TechRadar ProSecurity BuyerYahoo FinanceSecurityBriefChannel Insider

Key Capabilities

Physical Disconnection

Vault storage is physically disconnected from all network infrastructure. No network path, logical or physical, exists between Vault and production systems during isolation periods.

AES-256 Encryption

All data stored in Vault is encrypted at rest using AES-256 with hardware-managed keys. Even physical access to the storage media yields nothing without the encryption keys.

Cryptographic Integrity

Every data asset stored in Vault is hashed at ingestion. On retrieval, the hash is verified to confirm the data has not been tampered with or corrupted.

Controlled Transfer Windows

Data moves into and out of Vault through time-bound, policy-controlled windows. The transfer conduit physically disconnects after each operation.

Immutable Access Logs

Every transfer, retrieval, and access attempt is logged on physically disconnected storage that cannot be modified by any network-connected user or system.

Regulatory Retention

Vault supports configurable retention policies that meet GDPR, NIS2, DORA, and industry-specific data retention requirements.

Choose Your Protection

Which OSS Fits?

300GB

Low Use Vault, Deep Cold Storage

From £74.99/mo

inc. VAT · £0 due today

Offline Secure Storage for Encrypted Offline Storage, low use vault, deep cold storage.

What 300GB holds

~60,000 high-res photos
~150,000 PDF documents
~1,200 hours of voice recordings
~75 hours of HD video

Specifications

Capacity

300GB

Access

2 windows/week

Authentication

Identity-locked

Commitment

36 months

Security & Compliance

NATO-Approved FacilityDSIT-ReferencedGDPR Art. 32Cyber Essentials Plus

How to Get Started

Step 1

Critical Data Inventory

Identify all data assets that require air-gapped protection: recovery copies, configurations, regulatory records, and organisational crown jewels.

Step 2

Vault Architecture Design

Define storage capacity, encryption requirements, transfer schedules, retention policies, and multi-site replication needs.

Step 3

Initial Data Ingestion

Transfer critical data to Vault through controlled windows, verify cryptographic integrity, and validate retrieval procedures.

Step 4

Operational Integration

Automate transfer schedules, integrate with Execute for recovery orchestration, and establish ongoing integrity verification procedures.

Commercial Advantage

Win Business, Earn Trust, and Build Reputation with Butterfly

Butterfly is an operational model that helps organisations structure sensitive data to close deals faster, strengthen client relationships, and demonstrate the governance maturity that wins enterprise contracts.

Built on the VPPP framework (Vault, Policy, Permissions, Purpose), Butterfly maps your sensitive data and assigns dedicated Vaults by role, relationship, and purpose, turning data stewardship into a competitive advantage.

Deal Readiness

Governed materials ready to share with confidence

Client Trust

Demonstrate stewardship that earns loyalty

Board Confidence

Clear governance that inspires stakeholders

Enterprise Scale

Structure data governance across your organisation

Butterfly deployment model

Who Uses Butterfly?

  • Sales Teams

    Secure client proposals, pricing, and commercial intelligence

  • Service Providers

    Exchange sensitive documents with clients through governed Vaults

  • Businesses

    Protect strategic plans, IP, and competitive intelligence

  • Family Offices

    Structure data governance across principals, staff, and advisors

Questions

Frequently Asked

Ready to take the next step?

See how Firevault can protect your most sensitive data with physically disconnected storage.

    Firevault

    Firevault is Offline Secure Storage. Hardware you own, physically disconnected by default, with KYC-verified access. Ransomware-proof by design, not by patch.

    © 2026 Firevault Limited. Disconnect to Protect®