Cigent employs proven methodology and technology to create and store keys to prevent compromise from the sophisticated and persistent actors. The approach was developed by and with US Federal agencies requiring the highest level of protection for sensitive data in high-risk environments.
Decades of real-world data recovery experience informed the development of Cigent encryption keys. Based on proven methodology they prevent compromise by any attack vector
Cigent uses an advanced algorithm of key creation that takes the password the user types in and augments it with additional characters derived from the device utilizing maximum available characters. Impossible to reverse engineer the algorithm.
Upon creation, keys are deconstructed and randomly disseminated throughout the drive This prevents an adversary from finding the key and using it to recover the data.
Find answers to common questions and concerns about our products, implementation, and support.
What are Inaccessible Keys?
Inaccessible Keys are a security feature developed by Cigent to ensure that critical data remains protected under all circumstances. They are cryptographic keys stored in a way that makes them unavailable to both the operating system and attackers, thus safeguarding sensitive information from unauthorized access, even if the system is compromised.
How do Inaccessible Keys enhance data security?
Inaccessible Keys enhance security by isolating encryption keys from the operating system and other applications. This isolation prevents malware or any unauthorized software from accessing or extracting the keys, ensuring that encrypted data remains secure even if the system is infected or compromised.
In what scenarios are Inaccessible Keys most beneficial?
Inaccessible Keys are particularly beneficial in scenarios where data security is paramount, such as in financial services, healthcare, government sectors, and any business handling sensitive or proprietary information. They are crucial for protecting data against sophisticated cyber attacks, insider threats, and when data is stored on devices that might be lost or stolen.
Are Inaccessible Keys compatible with existing security infrastructures?
Yes, Inaccessible Keys are designed to be compatible with existing security infrastructures. They can be integrated seamlessly into current systems to enhance the security of data without requiring significant changes to existing applications or workflows.
How can one implement Inaccessible Keys in their organization?
Implementing Inaccessible Keys requires coordination with Cigent’s security solutions. Organizations interested in adopting this technology should contact Cigent for a detailed consultation and integration plan. Cigent provides full support in implementing these keys, including installation, configuration, and ongoing management to ensure optimal security.