Contact Us
Get a Demo
Contact Us
Get a Demo
Get a Demo

Full Drive Encryption

Protect your data at rest. Meet compliance requirements.
Schedule a Demo

Trusted By

  • AV Comparatives
  • Logo (5)
  • CDS
  • CPR tools
  • Logo (16)
  • Logo (17)
  • IO Active
  • 7
  • Kanguru
  • MITRE
  • 4
  • Petronella
  • Logo (15)
  • US DOD
Value

Effectively, efficiently protect data-at-rest

Full Drive Encryption management solutions for BitLocker and SEDs.

Cigent Full Drive Encryption efficiently provides deployment, management, and reporting.

  • Protect At-Rest Data
    Ensure data cannot be accessed when a device goes missing. Document data was protected.
  • Meet Compliance Requirements
    Provide real-time visibility into the endpoint security posture. Optimized workflows to set, monitor and document status to efficiently complete audits. Meets data at rest compliance requirements for FIPS, CC, GDPR, HIPPA, and others.
  • Manages BitLocker
    Optimized for BitLocker manager experiences, it has granular controls that provide persona-based policy settings or bulk deployments.
    Pre-Boot Authentication (PBA) Enabled.
  • A Trusted Resource

    Utilizing Pre-Boot Authentication (PBA), recognized by the NSA/CSS, making it a trusted component in the Commercial Solutions for Classified (CSfC) program.

Full Disk Encryption
ISSUE

At-rest Encryption is a Must

Protecting sensitive data when a device goes missing. Enabling full-drive encryption solutions is a requirement for endpoint devices. Current options, built on 90s architecture, are inefficient and incapable of effectively providing granular control and may have complex and disjointed workflows. The result is that when you need it most, you may not be able to ensure encryption was enabled.
Stolen Laptops
53 secs
A laptop is stolen every 53 seconds
Chance a Laptop Will be Stolen
10
1 in 10 chance a laptop will be stolen during its lifetime
IT Practitioners Report
86 %
86% of IT practitioners report device thefts lead to data breaches

Certifications

Cigent technology has achieved various NIST, NIAP, and NSA certifications, is in use with US federal agencies, and is funded by In-Q-Tel.

  • nist-logo-png-transparent
  • 2
  • 7
  • 8
  • 4
  • 3
  • 5
  • 6
Use cases

Cigent in Action

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.
Prevent Ransomware and All Other Attacks - icon

Prevent Ransomware and All Other Attacks

  • Challenge: Detect and respond is insufficient to prevent data compromise. Malicious actors’ innovation continues to circumvent current endpoint security.
  • Cigent: Hidden drives and AI monitoring provide irrefutable PROTECTION of the data itself – even the device has been compromised.
Value

Simplifying Compliance and Protecting Data at Rest with Full Risk Encryption

Efficiently deliver Full Disk Encryption without impact end users

Cigent Full Disk Encryption efficiently provides deployment, management, and reporting.

  • Protect At-Rest Data
    Ensure data cannot be accessed when device goes missing. Document data was protected.
  • Manages BitLocker
    Provide real-time visibility into the endpoint security posture. Optimized workflows to set, monitor and document status to efficiently complete audits.
  • Advanced persistent threat protection:
    Optimized for BitLocker manager experiences has granular controls that allows provides persona-based policy settings or bulk deployments,
Placeholder Image
Value

Simplifying Compliance and Protecting Data at Rest with Full Risk Encryption

Placeholder Image

Efficiently deliver Full Disk Encryption without impact end users

Cigent Full Disk Encryption efficiently provides deployment, management, and reporting.

  • Protect At-Rest Data
    Ensure data cannot be accessed when device goes missing. Document data was protected.
  • Manages BitLocker
    Provide real-time visibility into the endpoint security posture. Optimized workflows to set, monitor and document status to efficiently complete audits.
  • Advanced persistent threat protection:
    Optimized for BitLocker manager experiences has granular controls that allows provides persona-based policy settings or bulk deployments,
Capabilities

Comprehensive Capabilities to Protect and Report

Discovery

Discovery

Collects detailed information on each device, including metrics such as device details, protection status, encryption method, and more.
Learn More
Key protectors

Additional Key Protectors

Supports multiple key protectors to ensure encryption keys are securely locked, with recovery options readily available.

Learn More
Encryption Status

Encryption Status and Troubleshooting

Provides real-time encryption and decryption statuses, facilitating swift troubleshooting and management.
Learn More
Recovery

Recovery

Ensures devices are recoverable using key protectors, enabling user access with a recovery key if necessary.
Learn More
Active Directory Integration

Active Directory Integration

 Seamlessly integrates with Active Directory, allowing for the import and export of crucial endpoint and user information.
Learn More
Audit and Compliance

Audit and Compliance

Offers comprehensive, customizable reporting for all FDE & Bitlocker-related activities, ensuring compliance and facilitating audits with detailed historical reports.
Learn More

Unlike traditional methods, Cigent’s patented erase verification proved superior to simple crypto erase, aiming for NSA approval. This unique capability allowed the Navy to repurpose drives confidently, knowing that sensitive data had been securely erased.

- DIGISTOR for US Navy

We couldn’t be more excited about our exclusive partnership with Cigent to equip selected Phison products with the most secure storage solution on the market.

- Sebastien Jean, CTO, Phison

We’re thrilled to be working with Cigent and Carahsoft to provide our Public Sector clients with a top-tier storage solution that boasts Government-accredited security certifications. This partnership along with our new offering is another stepping stone in Seagate’s continued support of our Public Sector clients.

- Mike Moritzkat, Managing Director of Seagate Government Solutions

FAQs

Find answers to common questions and concerns about our products, implementation, and support.
What is Full Disk Encryption (FDE)?

Full Disk Encryption (FDE) is a security process that automatically converts the data on a hard drive into a form that cannot be understood by anyone who does not have the key to "undo" the conversion. This includes all the data, programs, and operating systems. Without the proper authentication key, even if the hard disk is stolen or compromised, the data remains inaccessible and secure.

How does Cigent’s Full Disk Encryption enhance data security?

Cigent’s Full Disk Encryption utilizes advanced encryption algorithms to protect all data stored on the disk. Our FDE solution is uniquely designed to integrate seamlessly with existing security systems, providing an additional layer of security that ensures data is protected from unauthorized access, even if your system is compromised or stolen. It offers robust pre-boot authentication, which requires users to verify their identity before the system boots up.

What types of authentication methods can be used with Cigent’s Full Disk Encryption?
Cigent’s Full Disk Encryption supports multiple forms of authentication methods to meet various security needs and preferences. These include traditional password entry, biometric verification such as fingerprint scanning, and security tokens or smart cards. Users can choose one or combine several methods for enhanced security through multi-factor authentication.
Can Full Disk Encryption affect the performance of my device?
The impact of Full Disk Encryption on system performance is minimal. Cigent’s FDE solutions are designed to operate efficiently in the background with little to no perceptible effect on the speed or responsiveness of your device. Encryption occurs in real-time and decryption happens seamlessly as you access your files, ensuring secure yet fluid access to your data.
What happens if I forget my password or lose my authentication token for Full Disk Encryption?

Losing access to your authentication method can be problematic, but Cigent provides a robust recovery process to regain access to your encrypted disk. This process typically involves multiple identity verification steps to ensure the security of your data. We recommend setting up a recovery mechanism, such as backup authentication credentials or recovery keys, which should be stored securely and separate from your device.