{"id":105645,"date":"2025-07-04T06:48:40","date_gmt":"2025-07-04T06:48:40","guid":{"rendered":"https:\/\/x-phy.com\/?page_id=105645"},"modified":"2025-07-04T06:48:40","modified_gmt":"2025-07-04T06:48:40","slug":"x-phy-laptop-usecase","status":"publish","type":"page","link":"https:\/\/x-phy.com\/x-phy-laptop-usecase\/","title":{"rendered":"X-PHY Laptop Usecase"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"105645\" class=\"elementor elementor-105645\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-62ca69e0 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"62ca69e0\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-120cf438\" data-id=\"120cf438\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-37dcee64 elementor-widget elementor-widget-heading\" data-id=\"37dcee64\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">X-PHY<sup>\u00ae<\/sup> AI Cybersecurity Laptops: Use Case Scenarios<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3609a6d6 elementor-widget elementor-widget-text-editor\" data-id=\"3609a6d6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Combining the X-PHY<sup>\u00ae<\/sup> AI Embedded Cyber <span style=\"color: #00ccff;\"><strong><a style=\"color: #00ccff;\" href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-ssd\/\" target=\"_blank\" rel=\"noopener\">Secure SSD<\/a><\/strong><\/span> into world-class laptop solutions for a stand-alone, holistic, real-time defense against evolving cyber-attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-663ef05d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"663ef05d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6e21c02c\" data-id=\"6e21c02c\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-74802838 elementor-section-height-min-height elementor-reverse-mobile elementor-section-boxed elementor-section-height-default\" data-id=\"74802838\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4e177210\" data-id=\"4e177210\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ebb64f3 right_color elementor-widget elementor-widget-text-editor\" data-id=\"4ebb64f3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Using X-PHY<sup>\u00ae<\/sup> Laptop<\/h4><p>Sam has been issued a new X-PHY Laptop by his company and he has enabled all X-PHY <a href=\"https:\/\/x-phy.com\/\"><span style=\"color: #3366ff;\">cyber security solution<\/span><\/a> features through the X-PHY tools.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2f945f29 first_column\" data-id=\"2f945f29\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a52083e elementor-widget elementor-widget-image\" data-id=\"3a52083e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/X-PHY-Laptop-scaled.png\" class=\"attachment-full size-full wp-image-105655\" alt=\"\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/X-PHY-Laptop-scaled.png 2560w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/X-PHY-Laptop-300x200.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/X-PHY-Laptop-1024x683.png 1024w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/X-PHY-Laptop-768x512.png 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/X-PHY-Laptop-1536x1024.png 1536w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/X-PHY-Laptop-2048x1365.png 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-192a4414 elementor-section-height-min-height animated-slow elementor-section-boxed elementor-section-height-default elementor-invisible\" data-id=\"192a4414\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3851d8be fourth_column\" data-id=\"3851d8be\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ed15524 elementor-widget elementor-widget-image\" data-id=\"4ed15524\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-1-scaled.png\" class=\"attachment-full size-full wp-image-105657\" alt=\"\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-1-scaled.png 2560w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-1-300x200.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-1-1024x683.png 1024w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-1-768x512.png 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-1-1536x1024.png 1536w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-1-2048x1365.png 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5ecaa345\" data-id=\"5ecaa345\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-35d799b3 left_color elementor-widget elementor-widget-text-editor\" data-id=\"35d799b3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Scenario 1:<br \/>Public WiFi Vulnerability Attack<\/h4><p>Due to the pandemic, Sam has switched to Working From Home (WFH). He went to a nearby Cafe to work. For connectivity, <strong>he unknowingly connected to an unsecured WiFi<\/strong> that was set up by a threat actor which he presumed to be the cafe\u2019s\u00a0<a href=\"https:\/\/x-phy.com\/public-wifi-vulnerability\/\" target=\"_blank\" rel=\"noopener\">public WiFi<\/a>.<\/p><p>As soon as he is connected, the device control was jolted to the threat actor immediately as <strong>he attempts a cloning attack to steal all of his data<\/strong> within the <a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-laptop\/\">X-PHY\u00ae laptop.<\/a><\/p><p>Fortunately,<strong> X-PHY is empowered with Clone Protector which can provide up to 100% protection against cloning attack regardless partition or entire disk cloning. <\/strong>It\u00a0proceeds to shutdown the laptop to <strong>lockdown the drive and notified Sam via email of this attempt of \u201cCloning Attack\u201d.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-46fe1460 elementor-section-height-min-height animated-slow elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-invisible\" data-id=\"46fe1460\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5b637d4c\" data-id=\"5b637d4c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28cf8712 right_color elementor-widget elementor-widget-text-editor\" data-id=\"28cf8712\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Scenario 2:<br \/>Insider Threat (Drive Theft)<\/h4><p>A colleague of Sam, Jeremy, who is working in the same finance department knows of Sam\u2019s habit to store a copy of the financial data of the company within his laptop.<\/p><p>Grudging that he will be part of the retrenchment cycle that was announced last month, he decided <strong>to attempt to steal the financial data stored within Sam\u2019s laptop to expose to the public<\/strong>.<\/p><p>As soon as Sam had left his laptop unattended, Jeremy immediately conducted a few unsuccessful attempts to crack his laptop\u2019s password to gain access. Realizing that this was futile, Jeremy then proceeded to <strong>physically remove the SSD from Sam\u2019s laptop and connect it externally to his laptop but realized that it was inaccessible as it was an <a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-ssd\/\">X-PHY SSD<\/a><\/strong>.<\/p><p>With the <a href=\"https:\/\/x-phy.com\/glossary\/data-encryption\/\"><strong>self-encryption<\/strong><\/a> feature of X-PHY and its <strong>integrated hardware sensors to detect changes in environment and detachment of drive<\/strong>. The X-PHY AI was able to lockdown the drive and protect Sam\u2019s data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3a5f5eee third_column\" data-id=\"3a5f5eee\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-114ec29b elementor-widget elementor-widget-image\" data-id=\"114ec29b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-2-scaled.png\" class=\"attachment-full size-full wp-image-105659\" alt=\"\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-2-scaled.png 2560w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-2-300x200.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-2-1024x683.png 1024w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-2-768x512.png 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-2-1536x1024.png 1536w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-2-2048x1365.png 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3fe7391a elementor-section-height-min-height animated-slow elementor-section-boxed elementor-section-height-default elementor-invisible\" data-id=\"3fe7391a\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-15b47bb7 midd_column\" data-id=\"15b47bb7\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-288f901 elementor-widget elementor-widget-image\" data-id=\"288f901\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-3-scaled.png\" class=\"attachment-full size-full wp-image-105661\" alt=\"\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-3-scaled.png 2560w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-3-300x200.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-3-1024x683.png 1024w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-3-768x512.png 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-3-1536x1024.png 1536w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-3-2048x1365.png 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4747a609\" data-id=\"4747a609\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26c061f3 left_color elementor-widget elementor-widget-text-editor\" data-id=\"26c061f3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Scenario 3:<br \/>Zero-Day Exploit (Data Breach)<\/h4><p>Suspected to be hired by a business competitor of Sam\u2019s company, a <strong>ransomware gang started to target the company\u2019s data.<\/strong> They attempt to breach all of Sam\u2019s company\u2019s endpoint devices via a <strong>zero-day exploit based <a href=\"https:\/\/x-phy.com\/glossary\/ransomware-attacks\/\">ransomware attack<\/a><\/strong> <strong>that could bypass all existing software defenses in place such as firewall and antiviruses.<\/strong><\/p><p>However, <strong>Sam\u2019s laptop remains unaffected<\/strong>, as his laptop has the X-PHY installed that is based on the <a href=\"https:\/\/x-phy.com\/solutions\/zero-trust\/\"><strong>zero trust framework<\/strong><\/a> which trusts no one and detects threats only by <strong>analyzing read and write access patterns instead of relying on signatory or behavioral databases<\/strong> and thus, the ability to detect known and unknown threats.<\/p><p>With this, Sam\u2019s data remains safe from falling into the wrong hands, as it was able to lock down the drive itself to prevent the ransomware from encrypting the data stored within.<\/p><p>At the same time,<strong> Sam received a notification of the attack via email and highlighted this immediately to his IT admin which quickly was able to respond to this attack to prevent it from spreading further<\/strong>. Thus, greatly reducing the response time and cost of the attack.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-337a744d elementor-section-height-min-height animated-slow elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-invisible\" data-id=\"337a744d\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d6cf91\" data-id=\"d6cf91\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-355509b6 right_color elementor-widget elementor-widget-text-editor\" data-id=\"355509b6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Scenario 4:<br \/>Clicking on a Phishing Link<\/h4><p>A recent email posing as the company\u2019s admin has been circulating around the company\u2019s employees inbox. The email is not genuine and <strong>utilized a combination of spear and clone phishing techniques to make it look as genuine as possible.<\/strong><\/p><p>Given the nature of Sam\u2019s company business, it is only natural for them to be a target of such attacks. As they hold crucial data of clients and partners. This is especially so for Sam, who is working in the financial department of the company. Unknowingly, <strong>Sam received an incoming email with attachments from his \u201cIT Admin\u201d prompting him to download the attachments<\/strong> to \u201cupdate\u201d his company\u2019s device softwares. Believing it to be crucial, as it will affect his work, <strong>Sam downloaded the malicious attachment which as a result installed a malware<\/strong> that aims to clone the data of Sam\u2019s laptop back to the attacker.<\/p><p>Fortunately,\u00a0<a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-laptop\/\" target=\"_blank\" rel=\"noopener\">X-PHY\u00ae<\/a>\u00a0that is installed in Sam\u2019s laptop was able to<strong> detect the abnormal data read\/write patterns and immediately stopped it and notified Sam via email.<\/strong> Which he promptly shared with his real IT admin to quickly respond and announce to the rest of the company to be aware of this impending phishing attack and thus, prevented a potential data breach.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-15b02a7d fifth_column\" data-id=\"15b02a7d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-101ae4b5 elementor-widget elementor-widget-image\" data-id=\"101ae4b5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-4-scaled.png\" class=\"attachment-full size-full wp-image-105663\" alt=\"\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-4-scaled.png 2560w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-4-300x200.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-4-1024x683.png 1024w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-4-768x512.png 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-4-1536x1024.png 1536w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/Scenario-4-2048x1365.png 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6c637a86 elementor-section-height-min-height animated-slow elementor-section-boxed elementor-section-height-default elementor-invisible\" data-id=\"6c637a86\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-56d8e364 sixth_column\" data-id=\"56d8e364\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f139933 elementor-widget elementor-widget-image\" data-id=\"5f139933\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/erase.jpg\" class=\"attachment-full size-full wp-image-105665\" alt=\"\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/erase.jpg 800w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/erase-300x300.jpg 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/erase-150x150.jpg 150w, https:\/\/x-phy.com\/wp-content\/uploads\/2025\/06\/erase-768x768.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3cd590f6\" data-id=\"3cd590f6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7612c8f6 left_color elementor-widget elementor-widget-text-editor\" data-id=\"7612c8f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Scenario 5:<br \/>Tech Refresh Cycle (Rapid Purge)<\/h4><p>Sam\u2019s company practices a <strong>technology refresh cycle<\/strong> in every 3 years to keep their employee\u2019s devices up to date.<\/p><p>Understanding that he has the <strong>company\u2019s confidential data<\/strong> and a responsibility to uphold and that a <strong>general reformatting of the device won\u2019t suffice.<\/strong> Sam, utilized the <strong>Rapid Purge feature of X-PHY\u00ae to securely erase his data <\/strong>effectively from the physical block level of the drive, <strong>leaving no traces of <a href=\"https:\/\/x-phy.com\/glossary\/credential-theft\/\">data<\/a><\/strong> left within a matter of a few seconds.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5fccb5bf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5fccb5bf\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7fc00e73\" data-id=\"7fc00e73\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d216ee6 elementor-widget elementor-widget-heading\" data-id=\"3d216ee6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Facing cybersecurity<br>\nChallanges?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10837904 elementor-widget elementor-widget-heading\" data-id=\"10837904\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Speak to our expert today!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-394551a2 support_page_form elementor-widget elementor-widget-shortcode\" data-id=\"394551a2\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">[contact-form-7 id=\"48815\" title=\"Laptop Landing\" html_id=\"xphy_9\"]<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68b0083d elementor-widget elementor-widget-html\" data-id=\"68b0083d\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\n  .mebuttons {\n    position: relative;\n    margin-top: 40px;\n}\n.myCustomName, \n.myCustomEmail, \n.myCustomPhone, \n.myCustomAddress, \n.myCustomCompany,\n.myCustomVerification,span[data-name=\"email_verify\"] input{\n    background-color: transparent !important;\n    border: 0px !important;\n    border-bottom: 1px solid grey !important;\n    border-radius: 0px !important;\n    color: white;\n}\n    .myForm br {\n    display: none;\n}\n.myForm span {\n    display: inline-block !important;\n    width: 47% !important;\n    margin-bottom: 14px;\n}\n.myCustomName:focus, \n.myCustomEmail:focus, \n.myCustomPhone:focus, \n.myCustomAddress:focus, \n.myCustomCompany:focus{\n    border-color: white !important;\n    color: white;\n}\nspan[data-name=\"email_verify\"] {\n    width: 23% !important;\n}\ndiv#otp_button {\n    width: 23%;\n    display: inline-block;\n    \/* border-radius: 5px !important; *\/\n    margin-right: 12px;\n}\n.myForm p {\n    margin-bottom: 0px;\n}\n.myForm span:nth-child(1), .myForm span:nth-child(4), .myForm span:nth-child(3){\n    margin-right: 32px;\n}\n.myForm .your-company {\n    width: 98% !important;\n    margin-bottom: 43px;\n}\nform input:focus{\n    color: white !important;\n}\n.myForm .wpcf7-spinner {\ndisplay: block !important;\n}\n\n.myForm .wpcf7-form-control.has-spinner.wpcf7-submit {\n    text-transform: none;\n    background-color: white;\n    width: 117px;\n    border-radius: 29px;\n    color: #df156a;\n    font-weight: 500;\n    padding: 8px 28px;\n    background-image: none;\n}\n.myCustomChatButton,\nspan.myCustomOr{\n    display: none;\n}\n.myForm .wpcf7-form-control-wrap:nth-child(7) {\n    width: 47% !important;\n    margin-left: 35px;\n}\n#miniorange_otp_token_submit {\n    background-color: #df156a;\n    transition: .5s;\n    border-color: #df156a !important;\n    border: 1px solid;\n    letter-spacing: 0px;\n    border-radius: 5px;\n}\n#mo_message {\n    background-color: transparent !important;\n    padding: 5px;\n    color: white;\n    position: absolute;\n    bottom: 52px;\n    width: 100%;\n    left: -44px;\n    border-top: 0px !important;\n}\n#miniorange_otp_token_submit:hover{\n    transition: .5s;\n}\n@media (min-width:320px) and (max-width:768px) {\n.myForm span {\n    display: inline-block !important;\n    width: 98% !important;\n    margin-bottom: 14px;\n}\n#otp_button {\n    width: 100% !important;\n    display: inline-block;\n    margin-right: 13px;\n}\n.myForm .wpcf7-form-control-wrap:nth-child(7) {\n    width: 100% !important;\n    margin-left: 1px;\n}\n#mo_message {\n    bottom: 41px;\n    width: 100%;\n    left: -44px;\n    line-height: 15px;\n    min-width: 427px;\n}\n}\n<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6e7f0c3b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6e7f0c3b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d9eaaf0\" data-id=\"7d9eaaf0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6f87db13 elementor-widget elementor-widget-html\" data-id=\"6f87db13\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\n.first_column .elementor-background-overlay:after {\n    content: \"Start of User Journey\";\n    width: 230px !important;\n    position: absolute;\n    left: 39px !important;\n    color: white;\n    background-color: #DF166A;\n    border-radius: 10px;\n    text-align: center;\n    padding: 5px 0px;\n    font-size: 18px;\n    top: -7px !important;\n}\n.second_column .elementor-background-overlay:after {\n    content: \"Public Wifi Vulnerability Attack\";\n    width: 267px !important;\n    position: absolute;\n    right: 42px !important;\n    color: white;\n    background-color: #DF166A;\n    border-radius: 10px;\n    text-align: center;\n    padding: 5px 0px;\n    font-size: 18px;\n    top: -6px;\n}\n.third_column .elementor-background-overlay:after {\n    content: \"Physical Attack\";\n    width: 170px !important;\n    position: absolute;\n    left: 39px !important;\n    color: white;\n    background-color: #DF166A;\n    border-radius: 10px;\n    text-align: center;\n    padding: 5px 0px;\n    font-size: 18px;\n    top: -7px;\n}\n.fourth_column .elementor-background-overlay:after {\n    content: \"Cloning Attack\";\n    width: 147px !important;\n    position: absolute;\n    left: -165px !important;\n    color: white;\n    background-color: #DF166A;\n    border-radius: 10px;\n    text-align: center;\n    padding: 5px 0px;\n    font-size: 18px;\n    top: -7px;\n}\n.midd_column .elementor-background-overlay:after {\n    content: \"Ransomware Attack\";\n    width: 247px !important;\n    position: absolute;\n    left: -268px !important;\n    color: white;\n    background-color: #DF166A;\n    border-radius: 10px;\n    text-align: center;\n    padding: 5px 0px;\n    font-size: 18px;\n    top: -7px;\n}\n.fifth_column .elementor-background-overlay:after {\n    content: \"Phishing Attack\";\n    width: 200px !important;\n    position: absolute;\n    left: 39px !important;\n    color: white;\n    background-color: #DF166A;\n    border-radius: 10px;\n    text-align: center;\n    padding: 5px 0px;\n    font-size: 18px;\n    top: -5px;\n}\n.sixth_column .elementor-background-overlay:after {\n    content: \"Secure Data Erase\";\n    width: 200px !important;\n    position: absolute;\n    right: 39px !important;\n    color: white;\n    background-color: #DF166A;\n    border-radius: 10px;\n    text-align: center;\n    padding: 5px 0px;\n    font-size: 18px;\n    top: -7px;\n}\n.elementor-widget-container h4 {\n    color: #DF166A;\n    margin-bottom: 18px;\n    border-bottom: 1px solid #DF166A;\n}\n.right_color .elementor-widget-container {\nborder-color: #474747 #DF166A #474747 #474747 !important;\n}\n.left_color .elementor-widget-container {\n    border-color: #474747 #474747 #474747 #DF166A !important;\n}\n@media (min-width:320px) and (max-width:450px) {\n.fourth_column .elementor-background-overlay:after{\n    left:35px !important;\n    top: -11px;\n}\n.midd_column .elementor-background-overlay:after{\n    left: 40px !important;\n}\n.sixth_column .elementor-background-overlay:after{\n    right: -219px !important;\n}\n}\n<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>X-PHY\u00ae AI Cybersecurity Laptops: Use Case Scenarios Combining the X-PHY\u00ae AI Embedded Cyber Secure SSD into world-class laptop solutions for a stand-alone, holistic, real-time defense against evolving cyber-attacks. Using X-PHY\u00ae [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"class_list":["post-105645","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/pages\/105645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/comments?post=105645"}],"version-history":[{"count":0,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/pages\/105645\/revisions"}],"wp:attachment":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media?parent=105645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}