top of page
  • LinkedIn
  • Facebook
  • Youtube

+27 11 561 0900

 Mon - Fri 08:00 - 17:00

Prodata Logo-02.png

Data security that never quits

Prevent data theft with cutting-edge, zero-trust cybersecurity solutions that protect your information at all times.

Cigent develops self-defending storage solutions that protect data from unauthorized access. Their secure storage devices provide real-time defence, ensuring that sensitive information is safeguarded even if endpoints are compromised.

WHY CHOOSE CIGENT?

Cigent’s solutions provide intelligent data security, with endpoint protection that ensures sensitive data is secure and inaccessible to unauthorized users.

futuristics-tablet-working-overlay-business-people-with-tech-screen-hologram-looking-digit

FEATURED SOLUTION

Encrypted Storage with Threat Protection

Cigent Data Defense provides advanced security
controls to protect, hide, and destroy sensitive data on workstations, PCs, mobile systems and removable data stores.
Cigent protects data on devices operating at the edge from unauthorized access. Cigent solutions secures data at rest with layered protection including hardware encryption, pre-boot authentication, and multifactor authentication. Cigent also ensures data integrity when the device is in use preventing wiping and cloning and other data attacks.

Cigent Product Features

• Command Line Interface (CLI) For Secure Vaults: create up to eight Secure Vaults and adds support for Linux operating systems.
• Shields Up Mode: During a Shields Up condition, users will be required to use step-up authentication to access protected files.
• Cryptographic Erase (CE): Rapidly sanitises drives by deleting the key used to decrypt the data.
• Full Block Level Erase – A more comprehensive approach to data erasure, this initiates a hardware low-level format of the media.
• Complete Erasure Verification: This patented Cigent technology verifies that every block on the drive has been “wiped” after a full block erasure.
• Zero Trust protections: Requiring the user to use step-up authentication to access them.
• Immutable Data Access Logs.
• Data Defence supports multiple authentication options.

Cigent Solutions

• Endpoint Security

Downloadable Assets

Transform company IT infrastructure with tailored solutions. Secure, streamline, and scale any business today.

bottom of page