Get a Demo
Contact Us
Get a Demo
Contact Us
Get a Demo

Data Defense

Stop malicious data exfiltration, tampering and ransomware.

Schedule a Demo
VALUE

Unparalleled Protection Against Data Attacks

6
Effortless protection for your endpoint data without compromising user experience.

Cigent Data Defense employs layered protection and security to prevent unauthorized access to data. This first-of-its-kind approach maintains data security while the device is in use, ensuring data protection even if the device has been compromised.

  • Control Access
    Data remains protected through encryption even after the device is unlocked, preventing unauthorized access.
  • Secured Drives
    Data is held in secured drives that attackers cannot compromise or even view.
  • Instant Protection 
    AI enabled data monitoring and integration with EDR solutions identify attacks and instantly limits access mitigating risk.
  • Minimal user impact

    Granular policy controls and AI optimization secures data without compromising end user experience. 

Capabilities

PROTECT the Data

Stop ransomware and other threats by securing the data 

Cigent’s strategy to protecting the data itself ensures that data remains protected even if the device has been compromised.  Protecting against any threat vector, Cigent’s patented layered protection eliminates the ability of attackers to access endpoint data.  By focusing on the data itself, there is minimal disruption to end users and virtually no administrative overhead.

This potent combination of capabilities stops ransomware and all other endpoint data attacks.  Granular persona policies and AI monitoring minimize exposure without disrupting user experience. 


Cigent Data Defense novel protection includes:  
  

Zero-trust Access Control

Zero-trust Access Control

  • Trust, but verified, policy-driven step-up-authentication access control –files remain protected from unauthorized access
  • Users access is frictionless with integration with all major authentication solutions
  • Granular policy control can protect all files, certain file-types, or specific folders (suggested re-write: Granular policy control protects all file types and folders

  • Access  controls can be always on and implemented when a threat is detected, when user access thresholds have been reached (i.e., number of open files), and in any environment (i.e., using non-trusted network)
Learn More Zero-trust Access Control
Hidden Drives

Hidden Drives

  • Data is completely invisible to malware, unauthorized users, and alternate operating systems
  • Attackers cannot see or locate data even when a device is compromised. Protects 
    against remote and physical attacks
  • Set and forget capability eliminates overhead for IT administrators

When SED (i.e. OPAL drive) is available

Learn More Hidden Drives
AI Secured Storage

AI Empowered Monitoring

  • Data is instantly locked when threat is detected
  • Unique AI data monitoring for anomalous access patterns
  • Integration with EDR, SIEM, and SOC solutions providing additional alerts
Learn More AI Empowered Monitoring

Unlike traditional methods, Cigent’s patented erase verification proved superior to simple crypto erase, aiming for NSA approval. This unique capability allowed the Navy to repurpose drives confidently, knowing that sensitive data had been securely erased.

- DIGISTOR for US Navy

We couldn’t be more excited about our exclusive partnership with Cigent to equip selected Phison products with the most secure storage solution on the market.

- Sebastien Jean, CTO, Phison

We’re thrilled to be working with Cigent and Carahsoft to provide our Public Sector clients with a top-tier storage solution that boasts Government-accredited security certifications. This partnership along with our new offering is another stepping stone in Seagate’s continued support of our Public Sector clients.

- Mike Moritzkat, Managing Director of Seagate Government Solutions

FAQs

Find answers to common questions and concerns about our products, implementation, and support.

What is Cigent Data Defense?

Cigent Data Defense is a cybersecurity solution designed to protect sensitive data from unauthorized access and threats. It utilizes advanced encryption, real-time monitoring, and multi-factor authentication to ensure data remains secure, both at rest and in transit.

How does Cigent Data Defense protect against ransomware attacks?

Cigent Data Defense employs a proactive approach to security by not only encrypting data but also by detecting and responding to ransomware activities in real-time. It isolates critical files and prevents them from being encrypted or deleted by unauthorized processes, effectively mitigating the risks of ransomware attacks.

Can Cigent Data Defense be integrated with existing IT infrastructure?

Yes, Cigent Data Defense is designed to seamlessly integrate with your existing IT infrastructure. It supports a wide range of operating systems and platforms, ensuring that it complements and enhances your current security protocols without the need for extensive modifications.

What types of organizations can benefit from Cigent Data Defense?

Cigent Data Defense is versatile and beneficial for a variety of organizations, including small businesses, large enterprises, healthcare providers, financial institutions, and government agencies. Any organization that handles sensitive data and requires robust security measures can benefit from Cigent's advanced data protection solutions.

How does Cigent ensure compliance with data protection regulations?

Cigent Data Defense helps organizations comply with major data protection regulations, such as GDPR, HIPAA, and CCPA. It features compliance monitoring tools that help track data access and usage, providing reports and logs necessary for audits and ensuring that data handling practices meet regulatory standards.