Get a Demo
Contact Us
Get a Demo
Contact Us
Get a Demo

Data Defense

Stop ransomware and data attacks

Schedule a Demo

Unparalleled Protection Against Ransomware and Data Attacks

Effortless protection for your sensitive endpoint data without compromising user experience.

Cigent Data Defense employs layered protection to prevent unauthorized access to the data when a device has been compromised.  With data protected, users remain productive during threats. There is no need to isolate or disconnect. 

  • Control Access
    Data remains protected after device is unlocked preventing unauthorized access.
  • Secured Drives
    Attackers cannot compromise what they cannot find within hidden drives.
  • Instant Protection 
    AI enabled data monitoring and integration with EDR solutions identify attacks and instantly limits access.


Ransomware is

Current detect and respond paradigm is insufficient. Ransomware and other attacks continue to compromise endpoints at an alarming rate.  Adoption of AI by attackers will only accelerate the volume, sophistication, and targeting of attacks.  The rate of infection and compromise will continue.

Money Lost From Attacks
$ 1.1 billion

Ransomware gangs collected record $1.1 billion from attacks in 2023 (Axios)

Data Encryption
76 %

66% of organizations experienced a ransomware attack in the past year, with 76% of those attacks resulting in data encryption (Sophos)

Ransomware Strains

Since 2020, there have been more than 130 different ransomware strains detected (Virus Total)


PROTECT the Data

Stop ransomware and other threats by securing the data 

Cigent’s approach of protecting the data itself ensures data remains protected regardless if the device has been compromised.  Protecting against any threat vector, Cigent’s patented layered protection eliminates the ability of attackers to access endpoint data.   And by focusing on the data itself there is minimal end user disruption and virtually no administrative overhead.  

This potent combination of capabilities stops ransomware and all other endpoint data attacks.  Granular persona policies and AI monitoring minimize exposure without disrupting user experience. 

Cigent Data Defense novel protection includes:  

Zero-trust Access Control

Zero-trust Access Control

  • Trust, but verified, policy-driven step-up-authentication access control –files remain protected from unauthorized access.  Users access is frictionless with integration with all major authentication solutions.
  • Granular policy control can be set by file-type, specific folders.

  • Always-on or risk-based policy enforcement.  Based on risk-profile policy, access controls are implemented when a threat is detected, when user access thresholds have been reached (i.e., number of open files), and environment (i.e., using non-trusted network).  
Learn More
Hidden Drives

Hidden Drives

  • Data is completely invisible to malware, unauthorized users, and alternate operating systems.
  • Attackers cannot see or locate data even when a device is compromised. Protects 
    against remote and physical attacks.
  • Set and forget capability no overhead for IT administrators

*When SED (i.e. OPAL drive) is available

Learn More
AI Secured Storage

AI Empowered Monitoring

  • Data is instantly locked when threat is detected
  • Unique AI monitoring of data itself for anomalous access patterns
  • Integration with EDR, SIEM, and SOC solutions providing additional alerts
Learn More

Unlike traditional methods, Cigent’s patented erase verification proved superior to simple crypto erase, aiming for NSA approval. This unique capability allowed the Navy to repurpose drives confidently, knowing that sensitive data had been securely erased.

- DIGISTOR for US Navy

We couldn’t be more excited about our exclusive partnership with Cigent to equip selected Phison products with the most secure storage solution on the market.

- Sebastien Jean, CTO, Phison

We’re thrilled to be working with Cigent and Carahsoft to provide our Public Sector clients with a top-tier storage solution that boasts Government-accredited security certifications. This partnership along with our new offering is another stepping stone in Seagate’s continued support of our Public Sector clients.

- Mike Moritzkat, Managing Director of Seagate Government Solutions


Find answers to common questions and concerns about our products, implementation, and support.

What is Cigent Data Defense?

Cigent Data Defense is a cybersecurity solution designed to protect sensitive data from unauthorized access and threats. It utilizes advanced encryption, real-time monitoring, and multi-factor authentication to ensure data remains secure, both at rest and in transit.

How does Cigent Data Defense protect against ransomware attacks?

Cigent Data Defense employs a proactive approach to security by not only encrypting data but also by detecting and responding to ransomware activities in real-time. It isolates critical files and prevents them from being encrypted or deleted by unauthorized processes, effectively mitigating the risks of ransomware attacks.

Can Cigent Data Defense be integrated with existing IT infrastructure?

Yes, Cigent Data Defense is designed to seamlessly integrate with your existing IT infrastructure. It supports a wide range of operating systems and platforms, ensuring that it complements and enhances your current security protocols without the need for extensive modifications.

What types of organizations can benefit from Cigent Data Defense?

Cigent Data Defense is versatile and beneficial for a variety of organizations, including small businesses, large enterprises, healthcare providers, financial institutions, and government agencies. Any organization that handles sensitive data and requires robust security measures can benefit from Cigent's advanced data protection solutions.

How does Cigent ensure compliance with data protection regulations?

Cigent Data Defense helps organizations comply with major data protection regulations, such as GDPR, HIPAA, and CCPA. It features compliance monitoring tools that help track data access and usage, providing reports and logs necessary for audits and ensuring that data handling practices meet regulatory standards.