Evolink Launches Secure Sphere Box –A Revolutionary Shield Against Internal Cyber Threats
18.09.2025
Evolink proudly introduces Secure Sphere Box – an advanced solution designed to prevent corporate data loss due to underestimated risks.
Secure Sphere Box is engineered to neutralize threats stemming from privileged employees, sophisticated cybercriminals, and ransomware attacks. Positioned as a vital extension to corporate Disaster Recovery (DR) strategies, it addresses both internal and external vulnerabilities that traditional measures often overlook.
What is Secure Sphere Box?
Secure Sphere Box is a specialized, hardware-based storage server that ensures fully isolated and tamper-proof archival protection for your most valuable data. By design, it creates an impenetrable safeguard that eliminates the possibility of internal misuse or external compromise.
Key Advantages
- Complete Network Isolation: The device has no permanent Internet or internal network connection. Its interface is activated only during scheduled archival transfers and automatically disabled immediately after.
- Autonomous Encrypted Storage: Data is securely retrieved in encrypted form, managed exclusively by the server. It is not subject to remote commands, eliminating the risk of external manipulation.
- Dual-Control Physical Access: On-site console access requires simultaneous authentication from both the client and an Evolink representative, ensuring maximum security. Neither party can access the archives alone.
How It Works
Secure Sphere Box is designed to serve as the last line of defence within your disaster recovery framework, complementing daily local backups and remote cloud storage. The process is entirely automated and requires no user intervention:
- Automated Transfers: At scheduled intervals, the device briefly connects to your primary backup system, retrieves encrypted copies of data, and disconnects.
- Absolute Isolation: Once transfers are complete, the network interface is shut down, leaving the server completely offline and inaccessible.
- Redundant Protection: Two independent, encrypted copies of your data are stored locally, with continuous integrity checks and automated reporting.
- Two-Factor On-Site Access: Data recovery is possible only through a physical console, requiring the presence of both your representative and Evolink’s.
Addressing Critical Risks Others Miss
Secure Sphere Box protects against two of the most pressing yet underestimated dangers:
- Malicious or Accidental Insider Actions: Even trusted IT staff with full access can inadvertently or deliberately delete or alter archives. Since Secure Sphere Box is completely isolated, such interference is impossible.
- Advanced Cyberattacks: Conventional backup systems, including immutable backups, remain vulnerable if attackers gain network access. Secure Sphere Box operates independently, never receiving external commands, making it immune to such attacks.
Who Should Consider Secure Sphere Box?
This solution is ideal for organizations with heightened security, regulatory, or compliance obligations, including:
- Large enterprises with dedicated IT departments
- Organizations subject to GDPR, ISO 27001, NIS-2, and DORA requirements
- Sectors handling critical data: finance, healthcare, manufacturing, and public administration
A Complete Solution by Evolink
Evolink delivers a turnkey service, including:
- Custom hardware sizing tailored to your needs
- Proprietary software for seamless operation
- 24/7 monitoring and support
Optional:
- Secure colocation in Evolink’s own data centers
- Private, reliable connectivity for optimal architecture deployment
Pricing & Availability
Secure Sphere Box is available via a monthly subscription model. For a tailored proposal that meets your organization’s specific requirements, please contact Evolink at:
PBX: +359 2 9691 555
Email: international.sales@evolink.com
Frequently Asked Questions (FAQ)
Q: What is Secure Sphere Box?
A: Secure Sphere Box is a specialized hardware storage server that provides fully isolated and tamper-proof archival protection for your data, safeguarding it against both internal and external threats.
Q: How does Secure Sphere Box protect against internal threats?
A: Secure Sphere Box is completely inaccessible through internal networks, eliminating any possibility of manipulation by IT staff. Data access is possible only through an on-site console and requires the simultaneous presence and authentication of both your representative and an Evolink representative.
Q: How does Secure Sphere Box defend against hacker attacks?
A: Secure Sphere Box communicates only on its own initiative and has no external control interface. This design makes it immune to cyberattacks, even if hackers gain access to your internal network.
Q: Who is Secure Sphere Box designed for?
A: Secure Sphere Box is built for organizations with heightened security, regulatory, and internal control requirements. It is especially relevant for:
- Large enterprises with in-house IT departments
- Organizations subject to GDPR, ISO 27001, NIS-2, and DORA compliance
- Sectors handling sensitive data, such as finance, healthcare, and public administration
Comparison: Secure Sphere Box vs. Traditional Backup Solutions
Characteristic
|
Secure Sphere Box
|
Traditional Backup Solutions
|
Network Connectivity
|
Fully isolated (activated only during data transfer)
|
Permanently connected to the network
|
Internal Threat Vulnerability
|
Very low (requires dual physical authorization)
|
High (accessible via internal networks)
|
External Threat Vulnerability
|
Very low (no external control interface)
|
High (can be disabled or manipulated remotely)
|
Data Access
|
On-site console with dual authentication
|
Remote network access
|
Autonomy
|
Fully autonomous (self-managed server)
|
Dependent on external commands and controls
|
Use Cases
- Ransomware Protection: Even if your main network is compromised and data is encrypted, Secure Sphere Box maintains an untouched copy for recovery.
- Regulatory Compliance: Meets strict data storage and security requirements (GDPR, ISO 27001, NIS-2, DORA).
- Defense Against Insider Threats: Protects data from accidental or intentional actions by employees with administrative rights.
- Disaster Recovery: Provides a local, physical copy of your critical data as part of a comprehensive disaster recovery strategy.
Technical Specifications
- Encrypted Operating System (OS Encryption): The operating system is disk-level encrypted, preventing unauthorized access through external tools.
- ZFS-Encrypted Local Storage: Data is stored on ZFS partitions, split into two independent groups, each protected with unique encryption keys.
- Minimal Network Activity: Network connectivity is disabled 99.9% of the time, with no open ports (e.g., SSH, Telnet).
- Two-Factor Physical Access: Access requires dual console authentication (client password + Evolink code).
- Controlled IPMI Support: Temporarily enabled by the client only when maintenance or archive access is needed.
Glossary of Terms
- Immutable Backup: An archive that cannot be altered or deleted for a predefined period.
- Disaster Recovery (DR): The process of restoring IT infrastructure and operations following a major disruption.
- Ransomware: Malicious software that encrypts data and demands ransom for its release.
- GDPR (General Data Protection Regulation): EU regulation governing personal data protection.
- ISO 27001: International standard for information security management.
- NIS-2 (Network and Information Systems Directive 2): EU directive for network and information security.
- DORA (Digital Operational Resilience Act): EU regulation ensuring the digital resilience of the financial sector.