Contact Us
Get a Demo
Contact Us
Get a Demo
Get a Demo

Inaccessible Keys

Unparalleled data protection
Schedule a Demo

Trusted By

  • AV Comparatives
  • Logo (5)
  • CDS
  • CPR tools
  • Logo (16)
  • Logo (17)
  • IO Active
  • 7
  • Kanguru
  • MITRE
  • 4
  • Petronella
  • Logo (15)
  • US DOD
OVERVIEW

Novel Approach to Creation and Storage of Keys

Cigent's methodology and technology render keys inaccessible to the most sophisticated and persistent actors, preventing data compromise. This approach was developed by and with US Federal agencies requiring the highest level of protection for sensitive data in high-risk environments.

  • Key creation and storage ensures that adversaries employing any known methodology cannot find or replicate the key.
  • Protects against sophisticated, persistent adversaries remote or physical attacks
  • Mitigates risk of future quantum computing attacks.
     
Inaccessible System Keys
Threat

Are you AlwaysPROTECTED™?

Reduce Costs 
$ 1 Million
Zero Trust reduces the cost of a data breach by about $1 million.
Secure
41 %
41% of organizations said they have deployed a zero-trust security architecture.
At Risk
59 %
59% of organizations said they have not deployed a zero-trust security architecture.

Certifications

Cigent technology has achieved various NIST, NIAP, and NSA certifications, is in use with US federal agencies, and is funded by In-Q-Tel.

  • nist-logo-png-transparent
  • 2
  • 7
  • 8
  • 4
  • 3
  • 5
  • 6
Use cases

Cigent in Action

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.
Prevent Ransomware and All Other Attacks - icon

Prevent Ransomware and All Other Attacks

  • Challenge: Detect and respond is insufficient to prevent data compromise. Malicious actors’ innovation continues to circumvent current endpoint security.
  • Cigent: Hidden drives and AI monitoring provide irrefutable PROTECTION of the data itself – even the device has been compromised.
Value

Simplifying Compliance and Protecting Data at Rest with Full Risk Encryption

Efficiently deliver Full Disk Encryption without impact end users

Cigent Full Disk Encryption efficiently provides deployment, management, and reporting.

  • Protect At-Rest Data
    Ensure data cannot be accessed when device goes missing. Document data was protected.
  • Manages BitLocker
    Provide real-time visibility into the endpoint security posture. Optimized workflows to set, monitor and document status to efficiently complete audits.
  • Advanced persistent threat protection:
    Optimized for BitLocker manager experiences has granular controls that allows provides persona-based policy settings or bulk deployments,
Placeholder Image
Value

Simplifying Compliance and Protecting Data at Rest with Full Risk Encryption

Placeholder Image

Efficiently deliver Full Disk Encryption without impact end users

Cigent Full Disk Encryption efficiently provides deployment, management, and reporting.

  • Protect At-Rest Data
    Ensure data cannot be accessed when device goes missing. Document data was protected.
  • Manages BitLocker
    Provide real-time visibility into the endpoint security posture. Optimized workflows to set, monitor and document status to efficiently complete audits.
  • Advanced persistent threat protection:
    Optimized for BitLocker manager experiences has granular controls that allows provides persona-based policy settings or bulk deployments,
Benefits

Robust Protection Against Advanced Adversaries and Quantum Threats

Protects Against Sophisticated, Persistent Adversaries, Remote or Physical Attacks

Inaccessible keys protect against sophisticated, persistent adversaries by ensuring that encryption keys cannot be maliciously accessed. 

Inaccessible Keys

Key Creation

We use an advanced algorithm of key creation that takes the password the user types in and augments it with additional characters derived from the device utilizing maximum available characters. Impossible with current computing to reverse engineer the algorithm.  
Learn More
Zero trust

Key Storage

Upon creation, keys are deconstructed and randomly disseminated throughout the drive  This prevents an adversary from finding the key and using it to recover the data.
Learn More

Unlike traditional methods, Cigent’s patented erase verification proved superior to simple crypto erase, aiming for NSA approval. This unique capability allowed the Navy to repurpose drives confidently, knowing that sensitive data had been securely erased.

- DIGISTOR for US Navy

We couldn’t be more excited about our exclusive partnership with Cigent to equip selected Phison products with the most secure storage solution on the market.

- Sebastien Jean, CTO, Phison

We’re thrilled to be working with Cigent and Carahsoft to provide our Public Sector clients with a top-tier storage solution that boasts Government-accredited security certifications. This partnership along with our new offering is another stepping stone in Seagate’s continued support of our Public Sector clients.

- Mike Moritzkat, Managing Director of Seagate Government Solutions

FAQs

Find answers to common questions and concerns about our products, implementation, and support.
What are Inaccessible Keys?

Inaccessible Keys are a security feature developed by Cigent to ensure that critical data remains protected under all circumstances. They are cryptographic keys stored in a way that makes them unavailable to both the operating system and attackers, thus safeguarding sensitive information from unauthorized access, even if the system is compromised.

How do Inaccessible Keys enhance data security?

Inaccessible Keys enhance security by isolating encryption keys from the operating system and other applications. This isolation prevents malware or any unauthorized software from accessing or extracting the keys, ensuring that encrypted data remains secure even if the system is infected or compromised.

In what scenarios are Inaccessible Keys most beneficial?

Inaccessible Keys are particularly beneficial in scenarios where data security is paramount, such as in financial services, healthcare, government sectors, and any business handling sensitive or proprietary information. They are crucial for protecting data against sophisticated cyber attacks, insider threats, and when data is stored on devices that might be lost or stolen.

Are Inaccessible Keys compatible with existing security infrastructures?

Yes, Inaccessible Keys are designed to be compatible with existing security infrastructures. They can be integrated seamlessly into current systems to enhance the security of data without requiring significant changes to existing applications or workflows.

How can one implement Inaccessible Keys in their organization?

Implementing Inaccessible Keys requires coordination with Cigent’s security solutions. Organizations interested in adopting this technology should contact Cigent for a detailed consultation and integration plan. Cigent provides full support in implementing these keys, including installation, configuration, and ongoing management to ensure optimal security.