Increasing sophistication of advanced data recovery techniques and new technology like quantum computing means all data is at risk. Recognizing this risk, the NSA issued Manual 9-12 providing specific, detailed guidance for the physical destruction of drives to prevent data recovery. With the increase of devices operating at the edge with sensitive physical destruction will not always be possible. Cigent provides advanced data erasure capabilities including patented verified data erasure to ensure data is permanently erased.
Crypto Erasure
Crypto erases works by destroying the encryption key needed to access encrypted data. The encrypted data remains on the storage device, but it's effectively impossible to decrypt, It can execute in milliseconds providing option for emergency situations.
Block Erasure
Block erasure erases solid-state drives (SSDs) by using the drive's internal functions to electrically erase each block. Block erasure delivers the permanent elimination of data on an SSD
Verified Data Erasure
Patented capability provides block-by-block analysis of drive to ensure all data has been permanently erased. Policy can continue to erase data until confirmation all data has been erased.
Local or Remote Execution
Cigent provides the option of initiating execution commands locally or remotely. Cigent provides enterprise management console deployed locally or in the cloud and a Command Line Interface (CLI) to execute erasure.
Benefits
Ensure Data is Destroyed
Emergency Data Erasure
Ensure data is erased, locally, remotely, or by policy. Crypto erase executes in milliseconds, with block erasure providing data eradication. Patented verified data erasure provides certainty that all data is permanently erased.
Address Quantum
Emerging quantum capabilities will challenge cryptographic protections. Nation states are collecting encrypted data with the expectation of use quantum to compromise the protections. Verified data erasure with block-by-block analysis ensures that data will not be compromised by future capabilities.
Drive Reuse
Cigent verified data erasure provides alternative to the physical destruction of drives to prevent unauthorized data recovery. The certainty provided by the patented solution allows drives to be reused or recycled providing lower cost and greener alternatives.
The Cigent Advantage
Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).
To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.
Benefits
Ensure Data is Destroyed
Emergency Data Erasure
Ensure data is erased, locally, remotely, or by policy. Crypto erase executes in milliseconds, with block erasure providing data eradication. Patented verified data erasure provides certainty that all data is permanently erased.
Address Quantum
Emerging quantum capabilities will challenge cryptographic protections. Nation states are collecting encrypted data with the expectation of use quantum to compromise the protections. Verified data erasure with block-by-block analysis ensures that data will not be compromised by future capabilities.
infographic
Ensure Verified Data Erasure
Verified Data Erasure goes beyond simple deletion. We use sophisticated methods to overwrite the data on your storage devices with random patterns.
ebook
Master Data Sanitization Techniques
Sensitive data must be properly secured throughout its lifecycle including ensuring proper disposal.
provide value to the visitor
Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge
Edge computing demands robust security to protect sensitive data from unauthorized ..
Disk Cloning and Data Destruction to Prevent Data Security Issues
Data destruction, data erasure, and disk cloning all play a role in data security--and ..
FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules
Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..
Frequently Asked Questions
Frequently asked questions ordered by popularity. Remember that if the visitor has not committed to the call to action, they may still have questions (doubts) that can be answered.
Still have questions?
Support details to capture customers that might be on the fence.
Cigent’s Federal Data Protection Solutions are second to none
Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.