Contact Us
Get a Demo
Contact Us
Get a Demo
Get a Demo

Hidden Drives

Make your data invisible
Schedule a Demo

Trusted By

  • AV Comparatives
  • Logo (5)
  • CDS
  • CPR tools
  • Logo (16)
  • Logo (17)
  • IO Active
  • 7
  • Kanguru
  • MITRE
  • 4
  • Petronella
  • Logo (15)
  • US DOD
OVERVIEW

Secure Vaults Render Data Completely Invisible to Malware, Unauthorized Users, and Alternate Operating Systems

Cigent's Hidden Drives offer an advanced layer of security for sensitive data. It ensures that information remains encrypted and unreadable even after logging onto the device, until step-up authentication is successfully provided. This feature makes it nearly impossible for unauthorized users to access or decipher the data.

  • Attackers cannot locate or see data even when the device is compromised
  • Hidden, Encrypted Partitions for the Most Sensitive Content
  • Protected Data Cannot be Cloned or “Wiped”
Hidden Drives
Threat

Are you AlwaysPROTECTED™?

Cybercrime Costs Growth
15 %
Cybercrime costs to grow by 15% per year over the next five years
Cost by 2025
$ 10.5 Trillion
Cybercrime costs will reach $10.5 trillion USD Annually by 2025
Endpoint Data
96 %
of all business workstations are not being backed up.

Certifications

Cigent technology has achieved various NIST, NIAP, and NSA certifications, is in use with US federal agencies, and is funded by In-Q-Tel.

  • nist-logo-png-transparent
  • 2
  • 7
  • 8
  • 4
  • 3
  • 5
  • 6
Use cases

Cigent in Action

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.
Prevent Ransomware and All Other Attacks - icon

Prevent Ransomware and All Other Attacks

  • Challenge: Detect and respond is insufficient to prevent data compromise. Malicious actors’ innovation continues to circumvent current endpoint security.
  • Cigent: Hidden drives and AI monitoring provide irrefutable PROTECTION of the data itself – even the device has been compromised.
Value

Simplifying Compliance and Protecting Data at Rest with Full Risk Encryption

Efficiently deliver Full Disk Encryption without impact end users

Cigent Full Disk Encryption efficiently provides deployment, management, and reporting.

  • Protect At-Rest Data
    Ensure data cannot be accessed when device goes missing. Document data was protected.
  • Manages BitLocker
    Provide real-time visibility into the endpoint security posture. Optimized workflows to set, monitor and document status to efficiently complete audits.
  • Advanced persistent threat protection:
    Optimized for BitLocker manager experiences has granular controls that allows provides persona-based policy settings or bulk deployments,
Placeholder Image
Value

Simplifying Compliance and Protecting Data at Rest with Full Risk Encryption

Placeholder Image

Efficiently deliver Full Disk Encryption without impact end users

Cigent Full Disk Encryption efficiently provides deployment, management, and reporting.

  • Protect At-Rest Data
    Ensure data cannot be accessed when device goes missing. Document data was protected.
  • Manages BitLocker
    Provide real-time visibility into the endpoint security posture. Optimized workflows to set, monitor and document status to efficiently complete audits.
  • Advanced persistent threat protection:
    Optimized for BitLocker manager experiences has granular controls that allows provides persona-based policy settings or bulk deployments,
Benefits

Invisible Data Protection

Hidden Drives

Attackers Cannot See or Locate Data Even When Device is Compromised

Following a compromise, attackers will be unable to locate protected files or drives as they are obfuscated using Cigent's patented technology.  This ensures that sensitive information remains invisible and inaccessible, effectively safeguarding it from unauthorized access even in the event of a device breach.
Learn More
Protects Data

Protects Against Remote or Physical Attacks

Cigent's Hidden Drives safeguard against both remote and physical attacks.  Whether an attacker has compromised a device by remote attack or has gained physical access, data remains hidden and protected.  Defending against physical attacks, drive can be configured with PBA rendering the O/S partition invisible. 
Learn More
Set and forget

Set and Forget Capability Requiring No Overhead for IT Administrators

The "set and forget" capability is designed to streamline security processes, requiring minimal to no ongoing management from IT administrators once configured. This feature allows for effortless maintenance of security protocols, enabling IT teams to focus on other critical tasks without worrying about continuous oversight of these systems.
Learn More

Unlike traditional methods, Cigent’s patented erase verification proved superior to simple crypto erase, aiming for NSA approval. This unique capability allowed the Navy to repurpose drives confidently, knowing that sensitive data had been securely erased.

- DIGISTOR for US Navy

We couldn’t be more excited about our exclusive partnership with Cigent to equip selected Phison products with the most secure storage solution on the market.

- Sebastien Jean, CTO, Phison

We’re thrilled to be working with Cigent and Carahsoft to provide our Public Sector clients with a top-tier storage solution that boasts Government-accredited security certifications. This partnership along with our new offering is another stepping stone in Seagate’s continued support of our Public Sector clients.

- Mike Moritzkat, Managing Director of Seagate Government Solutions

FAQs

Find answers to common questions and concerns about our products, implementation, and support.
What is Hidden Data?

Hidden Data refers to Cigent's technology that securely conceals sensitive files and information from unauthorized users and malware. It ensures that critical data is invisible and inaccessible without proper authentication, adding an extra layer of security beyond traditional encryption methods.

How do Hidden Drives work?
Cigent's Hidden Drives are secure storage areas on a device that are completely invisible to both the operating system and unauthorized users unless unlocked with the correct credentials. These drives employ multi-factor authentication to ensure only authorized users can access the data, providing robust protection against theft or unauthorized access.
Who can benefit from using Hidden Data and Hidden Drives?

This technology is ideal for individuals and organizations that handle sensitive or confidential information, such as financial data, personal identifiable information (PII), intellectual property, or government and defense-related data. It's particularly beneficial for those who need to safeguard their data from sophisticated cyber threats and insider attacks.

Are Hidden Drives compatible with existing IT infrastructure?

Cigent's Hidden Drives are designed to be seamlessly integrated with existing IT infrastructure. They are compatible with most operating systems and require minimal changes to current systems, making them easy to deploy and manage without disrupting existing workflows.

What happens if I forget my credentials to access the Hidden Drive?

Cigent provides several recovery options to regain access to Hidden Drives. Users can set up multiple authentication methods during the initial setup, including backup security questions, alternate authentication devices, or emergency recovery codes. It is recommended to establish a protocol for credential recovery during the setup phase to ensure data is always accessible by authorized users.