Advanced Adversary Protection

Advanced recovery and quantum decryption threats are changing the security landscape. Cigent delivers proven, layered protection built by experts in data exfiltration prevention to secure sensitive information against today’s most sophisticated attacks, and the quantum challenges of tomorrow.

Schedule a Demo

Cigent Protection

Advanced adversaries continually refine their techniques, employing drive cloning, alternate OS booting, hex editing, and even electron microscopy to extract encryption keys from storage media. Meanwhile, the emergence of quantum computing introduces a new class of threat: unprecedented computational power capable of breaking traditional encryption through rapid key factoring. Threat actors are already harvesting encrypted data today, intending to decrypt it later when quantum capabilities mature.

Cigent technology was built by experts in data exfiltration prevention with decades of experience supporting top federal and defense missions. Our layered, independently implemented protections are designed to prevent even the most advanced adversaries from accessing mission data, both now and in the quantum future.

Multiple Encryption Layers

Cigent combines hardware, software, and file-level encryption using independent cryptographic implementations validated by NIAP and approved by the NSA. Each layer functions autonomously, requiring an adversary to defeat every encryption boundary to gain access.

Pre-Boot Authentication

Pre-Boot Authentication (PBA) ensures that encryption keys and credentials remain isolated from the operating system. By enforcing authentication before boot, Cigent eliminates OS-level exploitation paths and strengthens the outer layer of data protection.

Secure Partitions

Cigent drives can be configured into independently locked partitions, keeping data unreadable even at the sector level. With independent access controls, these hidden partitions remain invisible to adversaries, preventing discovery, cloning, or future quantum-based decryption attempts.

Verified Data Sanitization

Cigent’s verified data erasure ensures data is permanently destroyed, beyond recovery. Traditional block erasure may leave residual data, but Cigent’s patented firmware verification confirms every block has been erased, preventing future data reconstruction by quantum or forensic means.

Preventing Advanced Threats

Cigent protects against all known threat vectors

While quantum computing has not currently been practically applied to cryptography, it is only a matter of time. There have been continuous improvements in stability and performance, including China’s 2024 announcement of a 504-Qbit chip that is claimed to be 180 million times faster than the fastest supercomputer. Quantum computing’s speed and ability to factor large integers will inevitably significantly disrupt current crypto protection methodologies.

  • Secure Partitions
    Cigent provides the ability to create secure partitions that can only be accessed with independent authentication. Those partitions are unreadable at the sector level, even if an adversary gets direct physical or remote access and logs into the operating system.
  • Verified Data Erasure
    Quantum decryption may one day render conventional encryption obsolete, but erased data cannot be decrypted. Cigent’s patented firmware-verified data sanitization performs block-by-block analysis to confirm that all data has been permanently and irreversibly erased. 
  • AES 256-bit Hardware Encryption
    Cigent employs proven AES-256 hardware encryption rigorously tested by the NSA, DISA, and other federal entities. This ensures compliance with CSfC for DAR requirements and provides long-term resilience against both classical and emerging quantum threats.

Cigent Protection: Hidden Partitions

Hidden Partitions can be used to protect against all the advanced recovery methods described above. When the Hidden Partitions are locked, they are protected by AES-256 encryption. Hex editors, third-party tools, and/or equipment cannot see and/or recover the encrypted data. The data is unreadable at the sector level due to the hidden partition. Even if a threat actor gains access to the user login, the data is protected in the hidden partitions and requires step-up authentication to unlock.

The Cigent Advantage

Cigent solutions were designed and developed with and for US Intelligence and Defense communities. All employees, including Cigent software development, are based in the US. The team includes multiple personnel with TS/SCI clearance with decades of data protection and operational experience to support your requirements.

Cigent solutions have been tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK) and are deployed across US Intelligence agencies, US Defense services, and the defense industrial base.

eBook

Protect Your Data at Rest

Cigent is prepared to support your mission, navigating the complex compliance requirements to protect data at the edge. Cigent solutions were developed for and with US Federal agencies with deep expertise in data protection. Read our Data-at-Rest eBook to learn more.

The Latest from Cigent

View All

Frequently Asked Questions

Still have Questions?

Learn more about Cigent and our solutions by downloading our Data at Rest Protection eBook.

Download eBook

Cigent’s Federal Data Protection Solutions are second to none

Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.

Schedule a Demo