How We Help
Data at Rest Protection
Quantum & Advanced Threat Protection
Data Sanitization
Insider Threat Protection
Capabilities
Products
Preboot
Cigent PBA
Prevent Data Attack
Cigent FDE
Prevent Ransomware & All Other Attacks - Cobalt Blue 1(1)
Cigent SSD Clients
Frame 84
Cigent SSD Enterprise
Frame 87(1)
Cigent SSD UxV
Industrial Control Systems
Cigent SSD ICS
Hex Editor
Custom Projects
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Blog
Read articles on all things cyber security.
Who we partner with
Handshake
Partners
Cigent Ecosystem of Device and Service Partners
compatible sed devices
Certified Drives
SED Devices Compatible with Cigent
Learn More About Cigent
News from Cigent
4 min read
Discover best practices for protecting sensitive ..
4 min read
Explore how disk cloning and data destruction can ..
Menu Close
Market - Tank (1)-1

Verified Data Sanitization

Cigent ensures data has been destroyed with crypto and block erasure and a patented firmware verified data erasure.

Verify Data is Destroyed

Eradicating data ensures adversary never gains access. The emerging threat of quantum computing increases the importance of proper data sanitization.

The standard for SSD sanitization is crypto and block erasure. However, these approaches do not ensure that all data is destroyed. Recognizing this risk, the NSA issued Manual 9-12 providing specific, detailed guidance for the physical destruction of drives to prevent data recovery.

Cigent provides a patented alternative with firmware level block-by-block analysis verifying that all data is erased. Combined with the capability to execute with local, remote, or rules-based commands, Cigent verified data erasure provides full-proof data sanitization capabilities.
Crypto Erase

Crypto Erasure

Crypto erase destroys the encryption key required to access encrypted data. The encrypted data remains on the storage device but is effectively impossible to decrypt. Crypto erase executes in milliseconds making it ideal in emergencies.

Block Erase

Block Erasure

Block erasure erases solid-state drives (SSDs) by using the drive's internal functions to electrically erase each block. Block erasure delivers the permanent elimination of data on an SSD.

Frame 93 (5)

Verified Data Erasure

Patented firmware capability provides block-by-block analysis of drive to ensure all data has been permanently erased. Policy can continue to erase data until confirmation that all data has been destroyed.

Local or Remote Admin

Local or Remote Execution

Cigent provides the option of initiating execution commands locally or remotely. Cigent provides enterprise management console deployed locally or in the cloud and a Command Line Interface (CLI) to execute erasure.

Layout 1 (1)
Benefits

Ensure Data is Destroyed

Emergency Data Erasure

Ensure data is erased, locally, remotely, or by policy. Crypto erase executes in milliseconds, with block erasure providing data eradication. Patented verified data erasure provides certainty that all data is permanently erased.

Screenshot 2024-09-05 054650

Address Quantum

Emerging quantum capabilities will challenge cryptographic protections. Nation states are collecting encrypted data with the expectation of use quantum to compromise the protections. Verified data erasure with block-by-block analysis ensures that data will not be compromised by future capabilities.

Screenshot 2024-09-05 054650

Drive Reuse

Cigent verified data erasure provides alternative to the physical destruction of drives to prevent unauthorized data recovery. The certainty provided by the patented solution allows drives to be reused or recycled providing lower cost and greener alternatives.

Screenshot 2024-09-05 054650

The Cigent Advantage

Cigent solutions were designed and developed with and for US Intelligence and Defense communities. All employees, including Cigent software development, are based in the US. The team includes multiple personnel with TS/SCI clearance with decades of data protection and operational experience to support your requirements.

Cigent solutions have been tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK) and are deployed across US Intelligence agencies, US Defense services, and the defense industrial base.

iStock-814367282
ebook

Master Data Sanitization Techniques

Sensitive data must be properly secured throughout its lifecycle including ensuring proper disposal.

verified_storage_devidce_sanitation_ebook
infographic

Ensure Verified Data Erasure

Verified Data Erasure goes beyond simple deletion. We use sophisticated methods to overwrite the data on your storage devices with random patterns.

certified_data_erasure_infographic
Resources / Blog
Introduce resources that can
provide value to the visitor
4 min read

Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge

Discover best practices for protecting sensitive data at the edge with Cigent's insights ..

4 min read

Prevent Data Security Issues with Disk Cloning & Data Destruction

Explore how disk cloning and data destruction can prevent security issues. Learn how to ..

Blog 4 min read

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules

Learn about FIPS 140-2 and FISMA compliance for cryptography modules, essential for ..

Frequently Asked Questions

Frequently asked questions ordered by popularity. Remember that if the visitor has not committed to the call to action, they may still have questions (doubts) that can be answered.

Still have questions?

Support details to capture customers that might be on the fence.

Card

Cigent’s Federal Data Protection Solutions are second to none

Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.