Get a Demo
Contact Us
Get a Demo
Contact Us
Get a Demo

Inaccessible Keys

Unparalleled data protection

Schedule a Demo
OVERVIEW

Novel Approach to Creation and Storage of Keys

Inaccessible System Keys

Cigent's methodology and technology render keys inaccessible to the most sophisticated and persistent actors, preventing data compromise. This approach was developed by and with US Federal agencies requiring the highest level of protection for sensitive data in high-risk environments.

  • Key creation and storage ensures that adversaries employing any known methodology cannot find or replicate the key.
  • Protects against sophisticated, persistent adversaries remote or physical attacks
  • Mitigates risk of future quantum computing attacks.
     

THREAT

Are you AlwaysPROTECTED™?

Reduce Costs
$ 1 Million

Zero Trust reduces the cost of a data breach by about $1 million.

Secure
41 %

41% of organizations said they have deployed a zero-trust security architecture.

At Risk
59 %

59% of organizations said they have not deployed a zero-trust security architecture.

Benefits

Robust Protection Against Advanced Adversaries and Quantum Threats

Protects Against Sophisticated, Persistent Adversaries, Remote or Physical Attacks

Inaccessible keys protect against sophisticated, persistent adversaries by ensuring that encryption keys cannot be maliciously accessed. 

Inaccessible Keys

Key Creation

We use an advanced algorithm of key creation that takes the password the user types in and augments it with additional characters derived from the device utilizing maximum available characters. Impossible with current computing to reverse engineer the algorithm.

Zero trust

Key Storage

Upon creation, keys are deconstructed and randomly disseminated throughout the drive  This prevents an adversary from finding the key and using it to recover the data.

Unlike traditional methods, Cigent’s patented erase verification proved superior to simple crypto erase, aiming for NSA approval. This unique capability allowed the Navy to repurpose drives confidently, knowing that sensitive data had been securely erased.

- DIGISTOR for US Navy

We couldn’t be more excited about our exclusive partnership with Cigent to equip selected Phison products with the most secure storage solution on the market.

- Sebastien Jean, CTO, Phison

We’re thrilled to be working with Cigent and Carahsoft to provide our Public Sector clients with a top-tier storage solution that boasts Government-accredited security certifications. This partnership along with our new offering is another stepping stone in Seagate’s continued support of our Public Sector clients.

- Mike Moritzkat, Managing Director of Seagate Government Solutions

FAQs

Find answers to common questions and concerns about our products, implementation, and support.

What are Inaccessible Keys?

Inaccessible Keys are a security feature developed by Cigent to ensure that critical data remains protected under all circumstances. They are cryptographic keys stored in a way that makes them unavailable to both the operating system and attackers, thus safeguarding sensitive information from unauthorized access, even if the system is compromised.

How do Inaccessible Keys enhance data security?

Inaccessible Keys enhance security by isolating encryption keys from the operating system and other applications. This isolation prevents malware or any unauthorized software from accessing or extracting the keys, ensuring that encrypted data remains secure even if the system is infected or compromised.

In what scenarios are Inaccessible Keys most beneficial?

Inaccessible Keys are particularly beneficial in scenarios where data security is paramount, such as in financial services, healthcare, government sectors, and any business handling sensitive or proprietary information. They are crucial for protecting data against sophisticated cyber attacks, insider threats, and when data is stored on devices that might be lost or stolen.

Are Inaccessible Keys compatible with existing security infrastructures?

Yes, Inaccessible Keys are designed to be compatible with existing security infrastructures. They can be integrated seamlessly into current systems to enhance the security of data without requiring significant changes to existing applications or workflows.

How can one implement Inaccessible Keys in their organization?

Implementing Inaccessible Keys requires coordination with Cigent’s security solutions. Organizations interested in adopting this technology should contact Cigent for a detailed consultation and integration plan. Cigent provides full support in implementing these keys, including installation, configuration, and ongoing management to ensure optimal security.