Today's threat environment demands modern weaponry, not yesterday’s defenses. The Cigent Dynamic Data Defense Engine™ (D3E) revolutionizes data security by protecting your sensitive files, whether live or encrypted, even in the event that your Windows file system is compromised. Unlike encryption, D3E threat sensors monitor your system for signs of hacking activity. When the threat-level is elevated, D3E acts like an automated panic room for your most treasured data, allowing you to contain the damage when all else fails.
With its effective, easy-to-use approach, Active Lock integrates with your Windows file system and secures your most important and sensitive files. Locked folders prevent unauthorized access to your files at all times. Protected folders are locked on-the-fly when D3E detects a potential threat.
With D3E two-factor authentication, Locked files can be accessed only with a step-up authentication. All authentication methods—such as Windows Hello fingerprint, Google Authenticator code, PIN, or other third-party authentication solutions—are delivered through a single, unified interface.
When a new network or public Wi-Fi connection is made, D3E locks files stored in Protected Folders and blocks lateral communications with other devices until the user trusts the network with a step-up authentication.
Network and File System deception engines provide virtually zero false-positive indications of hacking activity. When deception events are detected—such as an attempt to access user-configured file honeypots or lateral communication of rogue devices on a trusted network—D3E instantly blocks access to your system and locks all files stored in Protected folders.
Files in Protected folders are automatically locked and unlocked based on Windows Defender Security status. When a threat is detected by next-gen AV, EDR, and network security solutions, D3E ensures sensitive files—used by individuals or groups of users—are locked and remain locked, until the threat has been cleared.
AI-based machine learning sensors are deployed to monitor data access patterns and detect ransomware attacks—in real time. If you’re attacked, D3E prevents ransomware from encrypting files in Locked and Protected Folders.
D3E relies on machine learning sensors to continuously authenticate a user’s identity. Keyboard typing cadence and network usage patterns are monitored for signs of compromise. If abnormalities are detected, files in Protected folders are locked and unlocked automatically, based on AI-determined threat levels.
By modeling user behavior, D3E senses unusual file system access by file type. When an untrusted process attempts to access a file or insertion of an untrusted USB device is detected, D3E blocks access to the file system, until the user trusts it via a step-up authentication.
The Security Dashboard and System Tray enable end users to set up Locked and Protected folders, create data deception files, and configure second-factor authentication methods. The enterprise-grade D3E Console provides flexible, centralized deployment, configuration, and response management.