They steal your data
before they encrypt it.
The DEC-1 sits inline between your router and protected server as an invisible Layer 2 bridge. It monitors egress traffic with deterministic thresholds and severs the connection in milliseconds when exfiltration is detected. No cloud. No AI. No guesswork.
Where VaultGuardian intervenes
Modern ransomware attacks typically follow the same kill chain. The DEC-1 triggers at Phase 4 — before most companies even know they've been breached, and before encryption begins.
Initial Access
Day 0Stolen credentials, phishing, or zero-day exploit. The attacker gets in.
Lateral Movement
Days 1–14Reconnaissance. Privilege escalation. The attacker maps your network, finds your valuable data, establishes persistence.
Data Staging
Days 7–20Files compressed, archived, staged for extraction. Still silent. Still invisible to most security tools.
Exfiltration
⚡ DEC-1 TRIGGERSThe attacker starts uploading your data to external servers. This is the loudest moment in the entire attack — and the first time most companies find out they've been breached.
Connection severed. Alert fired. Response clock starts.
Your team knows the server is compromised while the attacker is still trying to extract data — not days or weeks later.
Encryption
✓ PREVENTEDRansomware deploys. Files encrypted. Ransom note delivered. By now, your data is already in the attacker's hands — unless exfiltration was stopped.
More than a kill switch
Exfiltration Prevention
Deterministic egress monitoring severs the connection the moment upload traffic exceeds configured thresholds. Designed to stop data from leaving your network. No AI. No cloud. No guesswork.
Stops data theftInstant Breach Detection
The kill event IS your alert. You know your infrastructure is compromised at the exact second the attacker acts — not 9 days later, not 7 weeks later, not 3 years later.
Millisecond detectionEncryption Prevention Window
Because exfiltration typically comes before encryption in the attack chain, catching the upload gives your team time to isolate systems before ransomware deploys.
Buys response timeBuilt for the edge
RK3588S Octa-Core
4× A76 + 4× A55
8 GB LPDDR4X
High-bandwidth packet processing
2×2.5G + 1×GbE
WAN + LAN + Management
5-Rule Engine
Complementary detection mechanisms
< 1 ms*
Deterministic connection kill
JSONL Forensics
180-day retention, AI-ready format
USB-C PD (5–20V)
65W adapter included
Go + Linux
Memory-safe, single binary
Isolated Dashboard
Dedicated management interface
* Response time measured on development hardware. Production benchmarks on NanoPi R6S in progress.
The DEC-1 stops data from leaving. Want to catch the act itself?
Observer watches your container logs in real time, classifies threats using AI, captures response evidence, and verifies outcomes. Detects the intrusion that triggered the exfiltration.
Pre-configured. Ready to deploy. One year of firmware updates included.
Firmware renewal: $99/year (optional — device works without it)