Get a Demo
Contact Us
Get a Demo
Contact Us
Get a Demo

Trusted By

AV Comparatives
Blueshift Cybersecurity
CDS
CPR Tools
Digistor
Dell Technologies
IO Active
IQT
Kanguru
MITRE
National Security Agency
Petronella
Seagate
US DOD
OVERVIEW

Cigent Protects the Data Itself with Full Drive Encryption

End User Data Loss

Portfolio of capabilities to stop threats, achieve compliance mandates, and ensure encrypted data protection regardless of the threat.

  • PROTECTS when device is compromised
  • PROTECTS against all forms of attacks
  • PROTECTS data with minimal experience impact
  • PROTECTS without administrative oversight
  • PROTECTS to meet compliance requirements

ISSUE

Data Found on Endpoint Continues to be Compromised

Ransomware, Data theft, loss, and stolen devices. Endpoint data detection and responses are not enough to stop data loss?

Executive Order on Improving the Nation’s Cybersecurity.
White House

The White House issued an EO, requiring federal agencies to adopt full disk encryption and multi-factor authentication for data at rest within 180 days. The order was issue on May 12, 2021

NIST FIPS 140-2
NSA

NIST FIPs 140-2 applies to data at rest ensures that unauthorized entities cannot read the dataeven if they have access to files. The use of FIPS 140-2 validate encryption guarantees thestrength of underlying algorithms.

CSfC for Data at Rest
NIST

NSA Commercial Solutions for Classified (CSfC) validates commercial products that meet the security requirement for protecting classified data. The Data at Rest Capability Package provides frameworks for security requirements and configuration information to ensure that products have enough protection for classified data on end-user devices.

Certifications

Cigent technology has achieved various NIST, NIAP, and NSA certifications, is in use with US federal agencies, and is funded by In-Q-Tel.

  • 8
  • 6
  • 2
  • 3
  • 4
  • 5
  • nist-logo-png-transparent
Use cases

Cigent in Action

Cigent Endpoint Data Protection Platform provides a single solution that transforms endpoint DATA PROTECTION.   

Existing endpoint protection continues to be overwhelmed by the volume of attacks, assailant innovation, and natural vulnerability of end users.  Rapid adoption of AI by attackers will further challenge existing approaches. 

Cigent provides a single solution that stops ransomware and all other attacks regardless of attackers’ sophistication, addresses data leakage, and protects data when devices are lost or stolen all while enabling organizations to meet compliance. 

Cigent addresses today’s threats by PROTECTING the data.  

Address Compliance Mandates

Address Compliance Mandates

Challenge: Deploying, managing, and reporting on FDE for endpoints is a compliance requirement for nearly all organizations.  Few options remain with the remaining products suffering from outdated and inefficient technology. 

Cigent: Modern, cloud console provides simple end-to-end approach to successfully deliver FDE, including BitLocker manager.   Solutions allow you to meet numerous compliance requirements including CSfC DAR, FIPS 140-2, NIST 800-171, and CMMC.

Prevent Ransomware and All Other Attacks - icon

Prevent Ransomware & All Other Attacks

  • Challenge: Detect and respond is insufficient to prevent data compromise. Malicious actors’ innovation continues to circumvent current endpoint security.
  • Cigent: Data centric protections including zero-trust access control, hidden drives, data monitoring AI, and integrations with EDR solutions stops malware from compromising data.
End User Data Loss and Leakage - icon

End User Data Loss and Leakage

Challenge: Whether through malicious actors or error endpoint data continues to exfiltrate.  Approaches to address have adverse impact on user experience and require significant IT oversight. 

Cigent: Policy based zero-trust endpoint access control enabled by AI monitoring limit exposure without compromising user productivity.  

Advanced and Persistent Threat Protection - icon

Advanced and Persistent Threat Protection

Challenge: Sophisticated and persistent attacks – especially those with physical access-  will ultimately be successful vs current solutions.  A variety of attacks can circumvent FDE, including BitLocker and even SEDs. 

Cigent: Cigent was designed by the world’s leading experts in data exfiltration.  Layered defense including inaccessible-keys, hidden drives, and AI tampering detection can PROTECT data from any known exfiltration approach.

Capabilities

Layers of Integrated Protections Ensures Data Integrity

A single solution, integrated layers of data protections delivers the most comprehensive and effective solution to protect data. 
Stops Ransomware

FDE and BitLocker Manager

FDE solutions including BitLocker manager and SED management including pre-boot-authentication (PBA) for CSfC approved data at rest.
Learn More FDE and BitLocker Manager
Zero-trust Access Control

Zero-trust Access Control

Supports BitLoker and other full disk encryption solutions
Learn More Zero-trust Access Control
Hidden Drives

Hidden Drives

Data is unreadable at the sector level even after logging on until unlocked with MFA. Hidden, encrypted partitions for the most sensitive content
Learn More Hidden Drives
AI Secured Storage

Ai Protection

AI monitoring data access patterns makes encrypted files and partitions inaccessible if threat is detected.
Learn More Ai Protection
Inaccessible Keys

Inaccessible Keys

Unique methodology and technology for the creation and storage of key renders all known compromises methodology obsolete.
Learn More Inaccessible Keys
Immutable Insider Protection

Immutable Insider Protection

Tracks data theft when insiders boot off a USB stick. Prevents insiders or external attackers from “covering their tracks.”
Learn More Immutable Insider Protection
Verified Data Erasure

Verified Data Erasure

Data erasure ensures every block has truly been wiped. Allow for drives to be safely repurposed or retired.
Learn More Verified Data Erasure

Unlike traditional methods, Cigent’s patented erase verification proved superior to simple crypto erase, aiming for NSA approval. This unique capability allowed the Navy to repurpose drives confidently, knowing that sensitive data had been securely erased.

- DIGISTOR for US Navy

We couldn’t be more excited about our exclusive partnership with Cigent to equip selected Phison products with the most secure storage solution on the market.

- Sebastien Jean, CTO, Phison

We’re thrilled to be working with Cigent and Carahsoft to provide our Public Sector clients with a top-tier storage solution that boasts Government-accredited security certifications. This partnership along with our new offering is another stepping stone in Seagate’s continued support of our Public Sector clients.

- Mike Moritzkat, Managing Director of Seagate Government Solutions