FV-Vault: Encrypted Offline Storage
Critical data, recovery copies, configurations, crown jewels, must exist beyond the reach of network-based attacks. Vault provides encrypted, physically disconnected storage that ensures your most important assets remain intact regardless of what happens on your network.
Control Module
You cannot protect data from network attacks by putting it on a different part of the network. Physical disconnection is the only storage protection that an attacker on your network cannot reach.
Air-gapped
Physically disconnected from all network infrastructure
AES-256
Encryption at rest with hardware key management
Zero
Network paths to stored data during isolation periods
Verified
Cryptographic integrity on every retrieval
Network-connected storage is network-accessible to attackers.
Backup Encryption
Ransomware specifically targets backup infrastructure. Network-connected backups, including cloud backups, are encrypted alongside production data, eliminating the primary recovery mechanism.
Immutability Bypasses
Immutable storage solutions still require network connectivity for management. If an attacker reaches the management interface, immutability settings can be overridden or the storage controller compromised.
Cloud Storage Risks
Cloud storage depends on credential security. Compromised cloud credentials or a misconfigured access policy can expose backup data to exfiltration or destruction.
The Scenario
Scenario: Air-Gapped Recovery After Total Encryption
A financial services firm experiences a ransomware attack that encrypts all production systems, including the primary backup server and the cloud-replicated copies. The attackers had compromised the backup administrator's credentials three weeks earlier and used them to delete cloud snapshots and encrypt the on-premises backup appliance. With Vault, the firm's critical data, database backups, system configurations, and regulatory records, exists on physically disconnected, encrypted storage. The ransomware never reached it because there was no network path to traverse. Recovery begins within hours using the Execute module, with cryptographic verification of every restored asset.
"They encrypted our production, our backups, and our cloud replicas. The only copies they did not reach were in the Vault, because there was no network path for them to follow."
Data protection through physical disconnection.
FV-Vault provides encrypted, air-gapped storage that keeps critical data beyond the reach of any network-based attack. Combined with controlled transfer windows, cryptographic integrity verification, and multi-party access governance, Vault ensures that your most important assets remain available for recovery regardless of what happens on your network.
- Physically disconnected storage beyond network reach
- AES-256 encryption with hardware key management
- Cryptographic integrity verification on every retrieval
- Controlled, time-bound transfer windows
- Multi-party authorisation for all access operations
- Configurable retention policies for regulatory compliance
Vault, How It Works
Step 1 of 4Vault stores encrypted data on physically disconnected infrastructure. Data is transferred during controlled windows through the Transfer module, encrypted with AES-256 using hardware key management, and verified with cryptographic hashes. Between transfer windows, no network path to the stored data exists.
Key Capabilities
Physical Disconnection
Vault storage is physically disconnected from all network infrastructure. No network path, logical or physical, exists between Vault and production systems during isolation periods.
AES-256 Encryption
All data stored in Vault is encrypted at rest using AES-256 with hardware-managed keys. Even physical access to the storage media yields nothing without the encryption keys.
Cryptographic Integrity
Every data asset stored in Vault is hashed at ingestion. On retrieval, the hash is verified to confirm the data has not been tampered with or corrupted.
Controlled Transfer Windows
Data moves into and out of Vault through time-bound, policy-controlled windows. The transfer conduit physically disconnects after each operation.
Immutable Access Logs
Every transfer, retrieval, and access attempt is logged on physically disconnected storage that cannot be modified by any network-connected user or system.
Regulatory Retention
Vault supports configurable retention policies that meet GDPR, NIS2, DORA, and industry-specific data retention requirements.
Choose Your Protection
Which OSS Fits?
300GB
Low Use Vault, Deep Cold Storage
From £74.99/mo
inc. VAT · £0 due today
Offline Secure Storage for Encrypted Offline Storage, low use vault, deep cold storage.
What 300GB holds
Specifications
Capacity
300GB
Access
2 windows/week
Authentication
Identity-locked
Commitment
36 months
Security & Compliance
How to Get Started
Step 1
Critical Data Inventory
Identify all data assets that require air-gapped protection: recovery copies, configurations, regulatory records, and organisational crown jewels.
Step 2
Vault Architecture Design
Define storage capacity, encryption requirements, transfer schedules, retention policies, and multi-site replication needs.
Step 3
Initial Data Ingestion
Transfer critical data to Vault through controlled windows, verify cryptographic integrity, and validate retrieval procedures.
Step 4
Operational Integration
Automate transfer schedules, integrate with Execute for recovery orchestration, and establish ongoing integrity verification procedures.
Win Business, Earn Trust, and Build Reputation with Butterfly
Butterfly is an operational model that helps organisations structure sensitive data to close deals faster, strengthen client relationships, and demonstrate the governance maturity that wins enterprise contracts.
Built on the VPPP framework (Vault, Policy, Permissions, Purpose), Butterfly maps your sensitive data and assigns dedicated Vaults by role, relationship, and purpose, turning data stewardship into a competitive advantage.
Deal Readiness
Governed materials ready to share with confidence
Client Trust
Demonstrate stewardship that earns loyalty
Board Confidence
Clear governance that inspires stakeholders
Enterprise Scale
Structure data governance across your organisation

Who Uses Butterfly?
-
Sales Teams
Secure client proposals, pricing, and commercial intelligence
-
Service Providers
Exchange sensitive documents with clients through governed Vaults
-
Businesses
Protect strategic plans, IP, and competitive intelligence
-
Family Offices
Structure data governance across principals, staff, and advisors
Questions
Frequently Asked
Ready to take the next step?
See how Firevault can protect your most sensitive data with physically disconnected storage.