Examples of what the Zeldaserver ® Solution can do for You



“Hope is not found in a way out but a way through.” ― Robert Frost


We have found the way through...


Let's begin with this...


The Zeldaserver Antimalware Server creates a Layer of Abstraction that Isolates your browsing from your computer. This Layer of Abstraction allows you to browse the web on an Isolated Network where negative events are contained. This, as a result, allows for the Contiguous Operation of your network.


The Trinity of Purpose



The Trinity of Purpose includes Abstraction, Isolation and Operation. Abstraction creates the opportunity for Isolation. Isolation creates the opportunity for Operation. Operation creates... your way through!

Layer of Abstraction: A layer of abstraction, in this case, is that upon which you offload an activity that bears risk. In offloading the activity, you are transferring the risk from your computer to the Zeldaserver. Yet, your original task is still completed. Only without the risk.

Here is a simple example...

A Mailman is a layer of abstraction between you and the person you send your mail to. Imagine that you send a letter to Mary as follows:


Layer of Abstraction Example




The Mailman, or the layer of abstraction, protects you from the bad things, Mary's dog, that would happen to you if you delivered your own mail. The Zeldaserver is the Mailman.

Isolation from Your Network: The Zeldaserver is designed to create an empty network for the malware to get lost in. There will be nothing but the Zeldaserver in this network. You can talk to the Zeldaserver, but the Zeldaserver cannot talk to you. This isolation prevents anything that may find its way to the Zeldaserver from discovering the rest of your network. It will appear as if it is all alone.

Contiguous Operation: The combination of the previous two, Abstraction and Isolation, allow for a work environment to continue working, unaware and unimpeded by anything that may have happened on the Zeldaserver. This keeps your business in a contiguous state of operation.


Let us look at a few examples...


Scrolling down will show the text


Accounting Example



Let us look at an accounting firm that is processing payroll and taxes for its clients. It has a vested interest in protecting its client’s data in every way that it can. Equally so, it must meet every deadline whether it be related to the taxes or the payroll. These deadlines, particularly payroll, cannot be missed.


For this example, a user in the payroll department was doing some casual browsing on the internet a few weeks ago and unbeknownst to them, got infected with something that has been quietly infecting all the computers in the business. Then it decides to act.


On Tuesday at 10:30 am, just before they begin to run the payroll, a message pops up on each computer saying that everything has been encrypted. This brings the entire business to a complete and full stop. Everything is dead. Two hundred and fifty-five clients are not going to get their payroll this week. The message tells them to pay $150,000 to unlock the computers.


With the use of a Zeldaserver , the casual browsing that infected, and eventually shutdown the business, would have happened on the Zeldaserver (Abstraction), which is completely isolated from everything else. This infection would not have even known that they existed (Isolation). The above scenario would never have happened, and they would have continued to work normally (Contiguous Operation).


Discover what a Zeldaserver ® solution can do for you!



Begin your journey...



Scrolling up will hide the text


The Engineering Example



Imagine that you have a user on your network that is responsible for engineering a mile-long conveyor and estimating its cost. This user is also responsible for managing a team of draftsmen and designers in producing this work on time and with an accurate estimation of its cost. Each user on your network wears many hats or plays a critical role to processes that must keep going.

Now, one day this user tries to use the web to do some research or find a good price on something. In the process, the user’s computer gets infected by one of the websites they visit. Three months later, this infection reboots the computer and displays a message to call a number on the screen and pay to unlock the computer. Before long, every computer in the engineering department was displaying the same message. This project, and everything else they were doing, has come to a screeching halt. All of their work will remain in a standstill until their computers have been recovered.



Each computer was asking for $1,000 to unlock it. There were more than 15 computers in the Engineering department and the company did not want to pay. After 24 hours they had recovered all the workstations. A week later, the whole thing happened again. It turned out that the infection had made its way into the backup being used to recover the computers. Each computer would have to be rebuilt from scratch.

So how does a Zeldaserver keep this from happening? If the research, or price digging, this user was doing was performed on a Zeldaserver (Abstraction), which cannot see or talk to anything on your network (Isolation). The infection would have never made it to any computer in the engineering department and none of their work, or time, would have been lost (Contiguous Operation).



Discover what a Zeldaserver ® solution can do for you!





Scrolling down will show the text

Executive Example



In this example let us look at the CFO who regularly manages the transfer of money between multiple bank accounts. Over a month ago this user was looking at some sporting news websites and got infected. This infection had been quietly watching her since. This infection is commonly known as a “Man in the Middle Attack”. This is what happened.

One day this user went to transfer some money at the bank. Only this time, the attacker, waiting for her to submit a transfer, intercepted the request and changed the amount and the destination account. When the bank sent back the receipt, the attacker, again, intercepted it and changed everything back to how it was when originally submitted. Thus, it would appear that everything was fine, when in reality, the bank account had just been emptied and sent to an account in another country. This money will never be seen again.

With the Zeldaserver, the sports browsing would have been done on the Zeldaserver (Abstraction). Because the bank transfers are done on the local computer, the isolated environment would have left the attacker waiting for something that would never happen (Isolation). As a result, the work of the business would continue normally (Contiguous Operation).



Discover what a Zeldaserver ® solution can do for you!





Scrolling up will hide the text