Our Capabilities

File Encryption

Files are protected on PCs, when synced to clouds, stored on NAS, or if users inadvertently share them with unintended parties

  • Users can securely share encrypted files with others or easily decrypt them before sending
  • Files include an organization key so colleagues can seamlessly work on files together

Secure File Sharing

Files remain encrypted, only accessible by trusted users, wherever they go

  • Protect all file types: Office, Adobe, CAD, images, applications – any file
  • Users easily share files outside the organization by adding individuals or groups to the file’s trusted user list

Zero Trust File Access

File access controls prevent zero-day ransomware and data exfiltration with file-level MFA

  • Critical files always require MFA and all other encrypted files only when threats are detected
  • Access files online and offline with PIN, fingerprint, facial recognition, CAC/PIV, Duo, and authenticator apps

Keep Alive Heartbeat

Independent file filter driver and firmware heartbeats that prevent file access if Cigent software is disabled

  • Protects files against advanced remote data theft and ransomware attacks
  • Automatically makes encrypted files and partitions inaccessible if Cigent service is not running properly

Invisible Data

Storage firmware renders data unreadable at the sector level, preventing all physical and remote attacks

  • Data is invisible, even after logging on, until unlocked with MFA and Cigent software
  • Drive can be configured with pre-boot authentication (PBA), rendering the O/S partition invisible

Hacker-proof Credentials

A novel approach to the creation and storage of credentials that make credential access impossible

  • Cryptographically derived from a user-supplied password
  • Never stored in their final form
  • Use the maximum length allowed by the drive

Verified Data Destruction

Block-level verification that data is irrevocably deleted and unretrievable by any known method

  • Allow for drives to be safely repurposed or retired
  • Saves budget and provides for a greener option
  • Provides emergency data destruction confidence

Secure Access Logs

Data access logs are securely stored in storage that cannot be wiped

  • Only solution that tracks data theft when insiders boot off a USB stick
  • Prevents insiders or external attackers from “covering their tracks.”
  • May be used for incident response, non-repudiation, and litigation