Contact Us
Get a Demo
Contact Us
Get a Demo
Get a Demo

Verified Data Erasure

Confidence that sensitive data has been irrevocably deleted
Schedule a Demo

Trusted By

  • AV Comparatives
  • Logo (5)
  • CDS
  • CPR tools
  • Logo (16)
  • Logo (17)
  • IO Active
  • 7
  • Kanguru
  • MITRE
  • 4
  • Petronella
  • Logo (15)
  • US DOD
OVERVIEW

Ensures Every Block Has Been Erased

Cigent's meticulous process ensures data has been erased, providing users with the confidence that their sensitive information is completely removed and irrecoverable. Through this advanced erasure technique, data cannot be retrieved or recreated.

  • Scans an SSD to Verify the Type of Blocks and Whether Data has Been Erased 
  •  Can Continue to Execute Deletion Until all Blocks Have Been Confirmed as Erased 
  • Provides a Report for the User Confirming Status
11
Threat

Are you AlwaysPROTECTED™?

Reduce Costs
$ 1 Million
Zero Trust reduces the cost of a data breach by about $1 million.
Secure
41 %
41% of organizations said they have deployed a zero-trust security architecture.
At Risk
59 %
59% of organizations said they have not deployed a zero-trust security architecture.

Certifications

Cigent technology has achieved various NIST, NIAP, and NSA certifications, is in use with US federal agencies, and is funded by In-Q-Tel.

  • nist-logo-png-transparent
  • 2
  • 7
  • 8
  • 4
  • 3
  • 5
  • 6
Use cases

Cigent in Action

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.
Prevent Ransomware and All Other Attacks - icon

Prevent Ransomware and All Other Attacks

  • Challenge: Detect and respond is insufficient to prevent data compromise. Malicious actors’ innovation continues to circumvent current endpoint security.
  • Cigent: Hidden drives and AI monitoring provide irrefutable PROTECTION of the data itself – even the device has been compromised.
Value

Simplifying Compliance and Protecting Data at Rest with Full Risk Encryption

Efficiently deliver Full Disk Encryption without impact end users

Cigent Full Disk Encryption efficiently provides deployment, management, and reporting.

  • Protect At-Rest Data
    Ensure data cannot be accessed when device goes missing. Document data was protected.
  • Manages BitLocker
    Provide real-time visibility into the endpoint security posture. Optimized workflows to set, monitor and document status to efficiently complete audits.
  • Advanced persistent threat protection:
    Optimized for BitLocker manager experiences has granular controls that allows provides persona-based policy settings or bulk deployments,
Placeholder Image
Value

Simplifying Compliance and Protecting Data at Rest with Full Risk Encryption

Placeholder Image

Efficiently deliver Full Disk Encryption without impact end users

Cigent Full Disk Encryption efficiently provides deployment, management, and reporting.

  • Protect At-Rest Data
    Ensure data cannot be accessed when device goes missing. Document data was protected.
  • Manages BitLocker
    Provide real-time visibility into the endpoint security posture. Optimized workflows to set, monitor and document status to efficiently complete audits.
  • Advanced persistent threat protection:
    Optimized for BitLocker manager experiences has granular controls that allows provides persona-based policy settings or bulk deployments,
Benefits

Secure Emergency Data Erasure with Verified Confidence

Data destruction

Provides Emergency Data Destruction Confidence

Cigent's verified data erasure technology offers confidence in emergency data destruction, ensuring sensitive information is securely and irreversibly removed. With state-of-the-art verification processes, users can trust that their critical data is effectively erased, meeting the highest standards of security and compliance. This innovative approach guarantees peace of mind in scenarios where data privacy and protection are paramount.
Learn More
Repurpose drives

Allows For Drives to be Safely Repurposed or Retired

Cigent offers a robust solution for securely repurposing or retiring drives, ensuring that sensitive data is irrecoverably deleted. Drives that previously had to be destroyed cannot be repurposed and reused.  
Learn More
AI Controls

Saves Budget and Provides More Eco-friendly Option

Cigent uses an approach to managing digital information that offers a solution that not only helps organizations save on their budget but also leans into a more eco-friendly paradigm. By securely wiping data in a manner that allows for the safe re-use of storage devices, Cigent ensures that companies can maximize their IT investments while significantly reducing electronic waste, contributing to a more sustainable and environmentally conscious approach to data management.
Learn More

Unlike traditional methods, Cigent’s patented erase verification proved superior to simple crypto erase, aiming for NSA approval. This unique capability allowed the Navy to repurpose drives confidently, knowing that sensitive data had been securely erased.

- DIGISTOR for US Navy

We couldn’t be more excited about our exclusive partnership with Cigent to equip selected Phison products with the most secure storage solution on the market.

- Sebastien Jean, CTO, Phison

We’re thrilled to be working with Cigent and Carahsoft to provide our Public Sector clients with a top-tier storage solution that boasts Government-accredited security certifications. This partnership along with our new offering is another stepping stone in Seagate’s continued support of our Public Sector clients.

- Mike Moritzkat, Managing Director of Seagate Government Solutions

FAQs

Find answers to common questions and concerns about our products, implementation, and support.
What is Verified Data Erasure?

Verified Data Erasure is a process implemented by Cigent to ensure that data deleted from storage devices is completely unrecoverable. This method uses advanced algorithms to overwrite data multiple times, verifying after each pass that the data has been successfully erased. This service is designed to meet strict regulatory compliance standards for data destruction.

How does Cigent's Verified Data Erasure differ from regular data deletion?

Regular data deletion typically removes the pointers to the data but leaves the actual data on the storage device until it is overwritten by new data. In contrast, Cigent's Verified Data Erasure not only removes the data but also securely overwrites it to prevent any possibility of recovery. This thorough approach ensures that sensitive information cannot be accessed even with sophisticated data recovery techniques.

What types of devices can use Cigent’s Verified Data Erasure service?

Cigent’s Verified Data Erasure service is compatible with a wide range of storage devices including hard drives, solid-state drives (SSDs), USB drives, and other types of removable media. Our service is designed to accommodate the needs of various devices used within personal, corporate, or government sectors.

Is Cigent's Verified Data Erasure certified or compliant with any standards?

Yes, Cigent's Verified Data Erasure process complies with leading industry standards such as the National Institute of Standards and Technology (NIST) guidelines, and the DoD 5220.22-M standard. These certifications ensure that our erasure methods meet rigorous data security protocols and provide assurance of the integrity of our data destruction processes.

How can I verify that my data has been completely erased?

After the erasure process, Cigent provides a comprehensive certification report that details the erasure methods used and confirms the complete destruction of the data. This report serves as a verifiable document that can be used for audit purposes or to comply with regulatory requirements, offering you peace of mind that your data has been securely erased.