Get a Demo
Contact Us
Get a Demo
Contact Us
Get a Demo

Hidden Drives

Make your data invisible

Schedule a Demo
OVERVIEW

Secure Vaults Render Data Completely Invisible to Malware, Unauthorized Users, and Alternate Operating Systems

Hidden Drives

Cigent's Hidden Drives offer an advanced layer of security for sensitive data. It ensures that information remains encrypted and unreadable even after logging onto the device, until step-up authentication is successfully provided. This feature makes it nearly impossible for unauthorized users to access or decipher the data.

  • Attackers cannot locate or see data even when the device is compromised
  • Hidden, Encrypted Partitions for the Most Sensitive Content
  • Protected Data Cannot be Cloned or “Wiped”

THREAT

Are you AlwaysPROTECTED™?

Cybercrime Costs Growth
15 %

Cybercrime costs to grow by 15% per year over the next five years

Cost by 2025
$ 10.5 Trillion

Cybercrime costs will reach $10.5 trillion USD Annually by 2025

Endpoint Data
96 %

of all business workstations are not being backed up.

Benefits

Invisible Data Protection

Hidden Drives

Attackers Cannot See or Locate Data Even When Device is Compromised

Following a compromise, attackers will be unable to locate protected files or drives as they are obfuscated using Cigent's patented technology.  This ensures that sensitive information remains invisible and inaccessible, effectively safeguarding it from unauthorized access even in the event of a device breach.

Protects Data

Protects Against Remote or Physical Attacks

Cigent's Hidden Drives safeguard against both remote and physical attacks.  Whether an attacker has compromised a device by remote attack or has gained physical access, data remains hidden and protected.  Defending against physical attacks, drive can be configured with PBA rendering the O/S partition invisible.

Set and forget

Set and Forget Capability Requiring No Overhead for IT Administrators

The "set and forget" capability is designed to streamline security processes, requiring minimal to no ongoing management from IT administrators once configured. This feature allows for effortless maintenance of security protocols, enabling IT teams to focus on other critical tasks without worrying about continuous oversight of these systems.

Unlike traditional methods, Cigent’s patented erase verification proved superior to simple crypto erase, aiming for NSA approval. This unique capability allowed the Navy to repurpose drives confidently, knowing that sensitive data had been securely erased.

- DIGISTOR for US Navy

We couldn’t be more excited about our exclusive partnership with Cigent to equip selected Phison products with the most secure storage solution on the market.

- Sebastien Jean, CTO, Phison

We’re thrilled to be working with Cigent and Carahsoft to provide our Public Sector clients with a top-tier storage solution that boasts Government-accredited security certifications. This partnership along with our new offering is another stepping stone in Seagate’s continued support of our Public Sector clients.

- Mike Moritzkat, Managing Director of Seagate Government Solutions

FAQs

Find answers to common questions and concerns about our products, implementation, and support.

What is Hidden Data?

Hidden Data refers to Cigent's technology that securely conceals sensitive files and information from unauthorized users and malware. It ensures that critical data is invisible and inaccessible without proper authentication, adding an extra layer of security beyond traditional encryption methods.

How do Hidden Drives work?

Cigent's Hidden Drives are secure storage areas on a device that are completely invisible to both the operating system and unauthorized users unless unlocked with the correct credentials. These drives employ multi-factor authentication to ensure only authorized users can access the data, providing robust protection against theft or unauthorized access.

Who can benefit from using Hidden Data and Hidden Drives?

This technology is ideal for individuals and organizations that handle sensitive or confidential information, such as financial data, personal identifiable information (PII), intellectual property, or government and defense-related data. It's particularly beneficial for those who need to safeguard their data from sophisticated cyber threats and insider attacks.

Are Hidden Drives compatible with existing IT infrastructure?

Cigent's Hidden Drives are designed to be seamlessly integrated with existing IT infrastructure. They are compatible with most operating systems and require minimal changes to current systems, making them easy to deploy and manage without disrupting existing workflows.

What happens if I forget my credentials to access the Hidden Drive?

Cigent provides several recovery options to regain access to Hidden Drives. Users can set up multiple authentication methods during the initial setup, including backup security questions, alternate authentication devices, or emergency recovery codes. It is recommended to establish a protocol for credential recovery during the setup phase to ensure data is always accessible by authorized users.