Get a Demo
Contact Us
Get a Demo
Contact Us
Get a Demo
OVERVIEW

Ensures Every Block Has Been Erased

11

Cigent's meticulous process ensures data has been erased, providing users with the confidence that their sensitive information is completely removed and irrecoverable. Through this advanced erasure technique, data cannot be retrieved or recreated.

  • Solution Crypto Wipes, Complete Full Block  Level Wipe, and Verifies at the Block Level that Data has been Permanently Erased 
  •  Issue Erasure Command Locally or Remotely
  • Documentation Verifying Data Erasure
BENEFITS

Secure Emergency Data Erasure with Verified Confidence

Data destruction

Provides Emergency Data Destruction Confidence

Cigent verified data erasure ensures sensitive information is securely and irreversibly erased. Offering local or remote command options, users can trust that is effectively erased in emergency situations where data privacy and protection are paramount.

Repurpose drives

Allows For Drives to be Safely Repurposed or Retired

Cigent ability to ensure sensitive data has been destroyed provides operational teams option to repurpose drives. Reusing drives that previously had to be destroyed can provide significant cost savings.

AI Controls

Provides Eco-friendly Option

Drives with sensitive data had to undergo destruction that eliminated opportunity to recycle valuable rare-earth materials. With Cigent verified data erasure, organizations can now choose to recycle drives that contained confidential data, confident that it cannot be recovered.

Cigent's endpoint security solution has provided unparalleled protection for our data, even in the face of sophisticated attacks.

- DIGISTOR for US Navy

Cigent's endpoint security solution has provided unparalleled protection for our data, even in the face of sophisticated attacks.

- DIGISTOR for US Navy

Cigent's endpoint security solution has provided unparalleled protection for our data, even in the face of sophisticated attacks.

- DIGISTOR for US Navy

FAQs

Find answers to common questions and concerns about our products, implementation, and support.

What is Verified Data Erasure?

Verified Data Erasure is a process implemented by Cigent to ensure that data deleted from storage devices is completely unrecoverable. This method uses advanced algorithms to overwrite data multiple times, verifying after each pass that the data has been successfully erased. This service is designed to meet strict regulatory compliance standards for data destruction.

How does Cigent's Verified Data Erasure differ from regular data deletion?

Regular data deletion typically removes the pointers to the data but leaves the actual data on the storage device until it is overwritten by new data. In contrast, Cigent's Verified Data Erasure not only removes the data but also securely overwrites it to prevent any possibility of recovery. This thorough approach ensures that sensitive information cannot be accessed even with sophisticated data recovery techniques.

What types of devices can use Cigent’s Verified Data Erasure service?

Cigent’s Verified Data Erasure service is compatible with a wide range of storage devices including hard drives, solid-state drives (SSDs), USB drives, and other types of removable media. Our service is designed to accommodate the needs of various devices used within personal, corporate, or government sectors.

Is Cigent's Verified Data Erasure certified or compliant with any standards?

Yes, Cigent's Verified Data Erasure process complies with leading industry standards such as the National Institute of Standards and Technology (NIST) guidelines, and the DoD 5220.22-M standard. These certifications ensure that our erasure methods meet rigorous data security protocols and provide assurance of the integrity of our data destruction processes.

How can I verify that my data has been completely erased?

After the erasure process, Cigent provides a comprehensive certification report that details the erasure methods used and confirms the complete destruction of the data. This report serves as a verifiable document that can be used for audit purposes or to comply with regulatory requirements, offering you peace of mind that your data has been securely erased.