What are you looking for ?
Advertise with us
RAIDON

Cigent Endpoint Data Protection Stops Ransomware with Zero-Trust Access Protection

Also introducing BitLocker Manager providing modern data-at-rest protection

Cigent Technology, Inc. announced its Endpoint Data Protection Platform that protects data from ransomware, data exfiltration, and data loss.

Cigent Endpoint Data Protection Platform

The platform provides a comprehensive portfolio of endpoint data offerings.

It is the first known commercial solution that protects Microsoft Windows endpoint device data every time, vs.every attack, and enables businesses to continue operating even while under attack – with minimal impact to users and minimal administrative demands on IT resources.

Fundamental changes are long overdue,” said Brett Hansen, CGO, Cigent. “The detect and respond approach is insufficient with today’s threats as it doesn’t provide protection of endpoint data or enable worker resilience during or following a successful breach – an important capability that will grow more crucial as AI-enabled attacks increase frequency and severity of endpoint compromise. The Cigent Platform is an entirely new failsafe that delivers endpoint protection for the modern workforce. It protects endpoint data from threats, remote or physical, allows users to continue to operate even if a device has been compromised, and with a user-empathy design that mitigates user impact, prevents burdening IT and security staff.

High price of insufficient endpoint security: Existing commercial endpoint and data security products are repeatedly proven to be ineffective at stopping ransomware, malware, and advanced persistent threats from disabling endpoints. Because of this, fully 68% to 70% of data loss incidents occur at the endpoint.

Cyberattacks will increase aggressively – in their frequency, their ability to penetrate traditional defenses, and their sophistication – with the imminent widespread adoption of AI by attackers. Attack volumes, sophistication, and precise targeting will escalate rapidly.

The outcome is broadly expected to result in more successful endpoint compromise attacks.

Recent ITIC research on the hourly costs of downtime found that costs now exceed $300,000 /hr for 91% of SME and large enterprises. Fully 44% of mid-sized and large enterprise survey participants reported that a single hour of downtime can cost their business as much as $1 million.

Detect and respond’ is insufficient. protect data security and user productivity. Unlike detection and response approaches, the Endpoint Data Protection Platform secures data, protecting it even when a device is compromised. It provides impenetrable layered protection that’s managed by a single cloud console.

Cigent delivers:

  • Zero trust access control: Verified, policy-driven step-up access control protects files from unauthorized access. Utilizing AI and integration with major authentication solutions, it protects data with minimal end-user impact.
  • Hidden data drives: Attackers cannot see or even locate protected drives even when a deception is compromised. Data remains hidden at the sector level until unlocked with step-up authentication.
  • AI threat defense: AI monitoring instantly elevates the threat level when ransomware or other malware attempts to access data. Additionally, integration and automation with EDR solutions elevates protection if threats are detected or if they are rendered inoperable by attackers.
  • Set and Forget’ operations: Protection is in place and automated, requiring no direct intervention or administration by security or IT resources.
  • Data protection for modern workforce: Minimal impact of end-user experience and sustained device usability during an attack event.

Endpoint Data Protection platform at work
The company begins with the assumption that the PC is going to be compromised. While there continue to be advances in the detect and respond approach, it remains insufficient to prevent data compromises.

The firm provides layered defense that protects data at rest or when in use. It uses software, hardware, or dual encryption as foundational data at rest protection. Customers using SSDs are able to provide additional protection with hidden partitions that are invisible to attackers. When a device is in use the firm maintains data protection with zero-trust access controls that prevent unauthorized access with minimal user disruption. In addition, it integrates with EDR and SIEM solutions instantly elevating protections based on their status. Finally, it leverages its own AI to detect malicious data activity and instantly secure files. This layered approach proactively protects data.

Cigent is the 1st solution that actively preserves user productivity and device efficiency whenever an attack is in process or has occurred.

In field tests with a current and pernicious attack, file access was immediately locked and the user’s ability to continue work was protected. No immediate IT intervention occurred or was needed.

Also introducing – BitLocker Manager:
The company is also delivering BitLocker Manager, another new capability in the Data Defense Platform that protects full disk encryption environments currently using “tired” technology and facing end-of-life resource issues.

Chris Steffen, VP, research, Enterprise Management Associates, said: “Ransomware and malware continue to erode productivity and plague companies. This endpoint protection platform clearly reflects the company’s mission: Cigent’s founders and lead developers are among the world’s leading data exfiltration experts, who reverse engineered their own processes to create a new solution that doesn’t just respond – it protects data. Just as important, Cigent is arming organizations with a new approach to cybersecurity that sharply reduces the burdens on endpoint and security managers.”

Endpoint Data Protection Platform equips the largest force in IT – the global community of endpoint users, managers, and administrators – to proactively protect themselves vs. ransomware and other threats before they can strike, and sustain productivity under attack,” said Hansen. “It provides layered security including zero-trust access control, hidden drives, and AI capabilities to stop all endpoint attacks without compromising daily operation and enabling workforce productivity throughout an attack.”

Read also :
Articles_bottom
ExaGrid
AIC
Teledyne
ATTO
OPEN-E