Protecting Data on the Edge from Remote Attacks
Detect and respond paradigm is insufficient to prevent data compromises on endpoints. Cigent delivers proactive data protection for vulnerable endpoints that stops data attacks.
Protection from all Threat Vectors
Cigent approach of protecting the data itself provides pervasive protection against different approaches. The fail-safe protection acts as a final line-of-defense that maintains data integrity when other protections have been defeated.
Minimal Impact to End Users
Cigent provides security for the modern workforce delivering robust protection without disrupting end users. Granular policy controls balance risk posture to user experience.
No Administrative Overhead
Endpoint protection relies upon detect and respond paradigm generating significant burden for security and IT teams. Cigent delivers proactive protection with data always protected with set-and-forget capabilities.
Protects Data when Device is Compromised
Zero trust access control with step-up authentication prevents unauthorized access even if device has been compromised by ransomware of other data attacks.
Advanced Data Capabilities
Proactive Protection for Endpoint Data Security
Zero-trust Access Control
Endpoint data remains in a protected state until users accesses with step-up authentication.
Trust, but Verify
Policy-driven step-up-authentication access control –files remain protected from unauthorized access. Efficient authentication and AI optimization minimizes user friction.
Granular Policy Control
Policy-based settings assigned based on user persona including file type, location, and risk tolerance.
Always-on or Risk-based Policy Enforcement
Based on risk-profile policy access controls implemented when a threat is detected, when user access thresholds have been reached and environment.
Instant Protection
Cigent works with your EDR and security solution to instantly protect data upon threat detection.
Elevated threats, elevated protections.
Cigent proactively increases data protection with identification of threats by EDR.
Integration with EDR, SIEM, and SOC
Integration with major vendors aligns data risk with risks levels.
Instant Lock
Continual communications with EDR results in instant-lock if attackers render EDR inoperable.
Hidden Partitions
Create hidden partitions for securing critical data.
Secure Enclaves
Data is unreadable at the sector level even after logging on until unlocked using step-up authentication.
Clone and Wipe Protection
Partitions are locked preventing coning and wiping attacks.
Simple Administration
Easily create and manage multiple partitions with enterprise management or user interface.
AI Data Monitoring
Storage embedded AI continually monitors data access patterns.
Instant Protection
Upon detection of anomalous behavior can instantly lock data preventing unauthorized access.
Tamper Proof
AI is embedded within storage preventing actors from compromising AI.
Stop Alt OS/Boot
AI will detect sophisticated actor utilizing alternative OS/Boot and instantly secure all data.
DEVICES
Devices Protected
Cigent provides the broadest range of offerings including coverage for PCs
with 2280 and a 2230 drives and Enterprise Storage.
PCs
Secure Storage 2280 SSD:
2280 is the legacy standard for storage configuration on PCs
Secure Storage 2230 SSD
2230 is an emerging standard for device manufactures storage configurations including Microsoft Surface, Dell Latitude, and HP EliteBooks
Cigent is the only provider of secure storage 2230 with PBA that has been approved by the NSA
Enterprise Storage
Secure Enterprise Storage CSfC
Cigent provides exclusive capabilities to protect servers operating on the edge. Provides full drive hardware encryption, PBA with MFA, and advanced capabilities including verified data erasure.
Secure Boot 2280 SSD Bravo
A boot drive is a storage device that contains the files needed to start a computer's operating system (OS) or firmware when it is turned on or restarted. Cigent ensures these critical drives are protected with features including full drive hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, verified data erasure, and command logs.
TAGLINE
The Cigent Advantage
Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).
To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.
ebook
Enhance Your Device Security
It’s a fair assumption that you’re going to deal with missing endpoint devices at some point, so the question is how to keep the data safe, even if a malicious actor has the actual device. Fortunately, Cigent’s NSA-sanctionedData Defense makes that possible.
provide value to the visitor
Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge
Edge computing demands robust security to protect sensitive data from unauthorized ..
Disk Cloning and Data Destruction to Prevent Data Security Issues
Data destruction, data erasure, and disk cloning all play a role in data security--and ..
FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules
Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..
Frequently Asked Questions
Frequently asked questions ordered by popularity. Remember that if the visitor has not committed to the call to action, they may still have questions (doubts) that can be answered.
Still have questions?
Learn more about Cigent and our solutions by downloading our company overview.
Cigent’s Federal Data Protection Solutions are second to none
Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.