Cigent's Hidden Drives offer an advanced layer of security for sensitive data. It ensures that information remains encrypted and unreadable even after logging onto the device, until step-up authentication is successfully provided. This feature makes it nearly impossible for unauthorized users to access or decipher the data.
Cybercrime costs to grow by 15% per year over the next five years
Cybercrime costs will reach $10.5 trillion USD Annually by 2025
of all business workstations are not being backed up.
Following a compromise, attackers will be unable to locate protected files or drives as they are obfuscated using Cigent's patented technology. This ensures that sensitive information remains invisible and inaccessible, effectively safeguarding it from unauthorized access even in the event of a device breach.
Cigent's Hidden Drives safeguard against both remote and physical attacks. Whether an attacker has compromised a device by remote attack or has gained physical access, data remains hidden and protected. Defending against physical attacks, drive can be configured with PBA rendering the O/S partition invisible.
The "set and forget" capability is designed to streamline security processes, requiring minimal to no ongoing management from IT administrators once configured. This feature allows for effortless maintenance of security protocols, enabling IT teams to focus on other critical tasks without worrying about continuous oversight of these systems.
Find answers to common questions and concerns about our products, implementation, and support.
What is Hidden Data?
Hidden Data refers to Cigent's technology that securely conceals sensitive files and information from unauthorized users and malware. It ensures that critical data is invisible and inaccessible without proper authentication, adding an extra layer of security beyond traditional encryption methods.
How do Hidden Drives work?
Cigent's Hidden Drives are secure storage areas on a device that are completely invisible to both the operating system and unauthorized users unless unlocked with the correct credentials. These drives employ multi-factor authentication to ensure only authorized users can access the data, providing robust protection against theft or unauthorized access.
Who can benefit from using Hidden Data and Hidden Drives?
This technology is ideal for individuals and organizations that handle sensitive or confidential information, such as financial data, personal identifiable information (PII), intellectual property, or government and defense-related data. It's particularly beneficial for those who need to safeguard their data from sophisticated cyber threats and insider attacks.
Are Hidden Drives compatible with existing IT infrastructure?
Cigent's Hidden Drives are designed to be seamlessly integrated with existing IT infrastructure. They are compatible with most operating systems and require minimal changes to current systems, making them easy to deploy and manage without disrupting existing workflows.
What happens if I forget my credentials to access the Hidden Drive?
Cigent provides several recovery options to regain access to Hidden Drives. Users can set up multiple authentication methods during the initial setup, including backup security questions, alternate authentication devices, or emergency recovery codes. It is recommended to establish a protocol for credential recovery during the setup phase to ensure data is always accessible by authorized users.