Get a Demo
Contact Us
Get a Demo
Contact Us
Get a Demo

Inaccessible Keys

Prevent data compromise from sophisticated threats

Schedule a Demo
OVERVIEW

Secured Encryption Keys

Inaccessible System Keys

Cigent employs proven methodology and technology to create and store keys to prevent compromise from the sophisticated and persistent actors. The approach was developed by and with US Federal agencies requiring the highest level of protection for sensitive data in high-risk environments.

  • Key creation and storage ensures that adversaries employing any known methodology cannot find or replicate the keys
  • Protects against sophisticated, persistent adversaries remote or physical attacks
  • Mitigates risk of future quantum computing attacks
     
BENEFITS

Robust Protection Against Advanced Adversaries

Protects Against Remote or Physical Attacks Sophisticated, Persistent Adversaries

Decades of real-world data recovery experience informed the development of Cigent encryption keys.  Based on proven methodology they prevent compromise by any attack vector 

Inaccessible Keys

Key Creation

Cigent uses an advanced algorithm of key creation that takes the password the user types in and augments it with additional characters derived from the device utilizing maximum available characters. Impossible to reverse engineer the algorithm. 

Learn More Key Creation
Key Protectors

Key Storage

Upon creation, keys are deconstructed and randomly disseminated throughout the drive This prevents an adversary from finding the key and using it to recover the data.

Learn More Key Storage

Unlike traditional methods, Cigent’s patented erase verification proved superior to simple crypto erase, aiming for NSA approval. This unique capability allowed the Navy to repurpose drives confidently, knowing that sensitive data had been securely erased.

- DIGISTOR for US Navy

We couldn’t be more excited about our exclusive partnership with Cigent to equip selected Phison products with the most secure storage solution on the market.

- Sebastien Jean, CTO, Phison

We’re thrilled to be working with Cigent and Carahsoft to provide our Public Sector clients with a top-tier storage solution that boasts Government-accredited security certifications. This partnership along with our new offering is another stepping stone in Seagate’s continued support of our Public Sector clients.

- Mike Moritzkat, Managing Director of Seagate Government Solutions

FAQs

Find answers to common questions and concerns about our products, implementation, and support.

What are Inaccessible Keys?

Inaccessible Keys are a security feature developed by Cigent to ensure that critical data remains protected under all circumstances. They are cryptographic keys stored in a way that makes them unavailable to both the operating system and attackers, thus safeguarding sensitive information from unauthorized access, even if the system is compromised.

How do Inaccessible Keys enhance data security?

Inaccessible Keys enhance security by isolating encryption keys from the operating system and other applications. This isolation prevents malware or any unauthorized software from accessing or extracting the keys, ensuring that encrypted data remains secure even if the system is infected or compromised.

In what scenarios are Inaccessible Keys most beneficial?

Inaccessible Keys are particularly beneficial in scenarios where data security is paramount, such as in financial services, healthcare, government sectors, and any business handling sensitive or proprietary information. They are crucial for protecting data against sophisticated cyber attacks, insider threats, and when data is stored on devices that might be lost or stolen.

Are Inaccessible Keys compatible with existing security infrastructures?

Yes, Inaccessible Keys are designed to be compatible with existing security infrastructures. They can be integrated seamlessly into current systems to enhance the security of data without requiring significant changes to existing applications or workflows.

How can one implement Inaccessible Keys in their organization?

Implementing Inaccessible Keys requires coordination with Cigent’s security solutions. Organizations interested in adopting this technology should contact Cigent for a detailed consultation and integration plan. Cigent provides full support in implementing these keys, including installation, configuration, and ongoing management to ensure optimal security.