Cigent secure drives create protected enclaves for sensitive data. It ensures that data remains encrypted and unreadable even after user logs onto the device, until step-up authentication is successfully provided. Data within the drive partitions are inaccessible and unreadable to an adversary - even if they have compromised device protection.
Following a compromise, attackers will be unable to locate protected files or drives with Cigent patented technology. This ensures that sensitive information remains invisible and inaccessible, effectively safeguarding it from unauthorized access even in the event of a device breach
Cigent hidden drives safeguard against both remote and physical attacks. Whether an attacker has compromised a device by remote attack or has gained physical access, sensitive data remains hidden and protected. Defending against physical attacks, drive can be configured with PBA rendering the O/S partition invisible
Cigent proactive protection provides efficient administration and no ongoing management. This feature allows for effortless maintenance of protection, enabling IT teams to focus on other critical tasks without worrying about continuous oversight.
Find answers to common questions and concerns about our products, implementation, and support.
What is Hidden Data?
Hidden Data refers to Cigent's technology that securely conceals sensitive files and information from unauthorized users and malware. It ensures that critical data is invisible and inaccessible without proper authentication, adding an extra layer of security beyond traditional encryption methods.
How do Hidden Drives work?
Cigent's Hidden Drives are secure storage areas on a device that are completely invisible to both the operating system and unauthorized users unless unlocked with the correct credentials. These drives employ multi-factor authentication to ensure only authorized users can access the data, providing robust protection against theft or unauthorized access.
Who can benefit from using Hidden Data and Hidden Drives?
This technology is ideal for individuals and organizations that handle sensitive or confidential information, such as financial data, personal identifiable information (PII), intellectual property, or government and defense-related data. It's particularly beneficial for those who need to safeguard their data from sophisticated cyber threats and insider attacks.
Are Hidden Drives compatible with existing IT infrastructure?
Cigent's Hidden Drives are designed to be seamlessly integrated with existing IT infrastructure. They are compatible with most operating systems and require minimal changes to current systems, making them easy to deploy and manage without disrupting existing workflows.
What happens if I forget my credentials to access the Hidden Drive?
Cigent provides several recovery options to regain access to Hidden Drives. Users can set up multiple authentication methods during the initial setup, including backup security questions, alternate authentication devices, or emergency recovery codes. It is recommended to establish a protocol for credential recovery during the setup phase to ensure data is always accessible by authorized users.