-1.png?width=2000&height=1005&name=Market%20-%20Tank%20(1)-1.png)
Verified Data Sanitization
Cigent ensures data has been destroyed with crypto and block erasure and a patented firmware verified data erasure.
Verify Data is Destroyed
Eradicating data ensures adversary never gains access. The emerging threat of quantum computing increases the importance of proper data sanitization.The standard for SSD sanitization is crypto and block erasure. However, these approaches do not ensure that all data is destroyed. Recognizing this risk, the NSA issued Manual 9-12 providing specific, detailed guidance for the physical destruction of drives to prevent data recovery.
Cigent provides a patented alternative with firmware level block-by-block analysis verifying that all data is erased. Combined with the capability to execute with local, remote, or rules-based commands, Cigent verified data erasure provides full-proof data sanitization capabilities.

Crypto Erasure
Crypto erase destroys the encryption key required to access encrypted data. The encrypted data remains on the storage device but is effectively impossible to decrypt. Crypto erase executes in milliseconds making it ideal in emergencies.

Block Erasure
Block erasure erases solid-state drives (SSDs) by using the drive's internal functions to electrically erase each block. Block erasure delivers the permanent elimination of data on an SSD.
.png?width=80&height=80&name=Frame%2093%20(5).png)
Verified Data Erasure
Patented firmware capability provides block-by-block analysis of drive to ensure all data has been permanently erased. Policy can continue to erase data until confirmation that all data has been destroyed.

Local or Remote Execution
Cigent provides the option of initiating execution commands locally or remotely. Cigent provides enterprise management console deployed locally or in the cloud and a Command Line Interface (CLI) to execute erasure.
.png?width=2000&name=Layout%201%20(1).png)
Benefits
Ensure Data is Destroyed
Emergency Data Erasure
Ensure data is erased, locally, remotely, or by policy. Crypto erase executes in milliseconds, with block erasure providing data eradication. Patented verified data erasure provides certainty that all data is permanently erased.

Address Quantum
Emerging quantum capabilities will challenge cryptographic protections. Nation states are collecting encrypted data with the expectation of use quantum to compromise the protections. Verified data erasure with block-by-block analysis ensures that data will not be compromised by future capabilities.

Drive Reuse
Cigent verified data erasure provides alternative to the physical destruction of drives to prevent unauthorized data recovery. The certainty provided by the patented solution allows drives to be reused or recycled providing lower cost and greener alternatives.

The Cigent Advantage
Cigent solutions were designed and developed with and for US Intelligence and Defense communities. All employees, including Cigent software development, are based in the US. The team includes multiple personnel with TS/SCI clearance with decades of data protection and operational experience to support your requirements.
Cigent solutions have been tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK) and are deployed across US Intelligence agencies, US Defense services, and the defense industrial base.

ebook
Master Data Sanitization Techniques
Sensitive data must be properly secured throughout its lifecycle including ensuring proper disposal.

infographic
Ensure Verified Data Erasure
Verified Data Erasure goes beyond simple deletion. We use sophisticated methods to overwrite the data on your storage devices with random patterns.

provide value to the visitor

Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge
Discover best practices for protecting sensitive data at the edge with Cigent's insights ..

Prevent Data Security Issues with Disk Cloning & Data Destruction
Explore how disk cloning and data destruction can prevent security issues. Learn how to ..

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules
Learn about FIPS 140-2 and FISMA compliance for cryptography modules, essential for ..
Frequently Asked Questions
Frequently asked questions ordered by popularity. Remember that if the visitor has not committed to the call to action, they may still have questions (doubts) that can be answered.
Still have questions?
Support details to capture customers that might be on the fence.

Cigent’s Federal Data Protection Solutions are second to none
Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.