Policy-based protections for endpoints block ransomware and other advanced threats.
Automated threat response reduces the blast radius and disruption of ransomware and lateral moving cyber threats.
Hidden encrypted vaults with secure SSDs make your endpoints the safest place to store sensitive data.
The Data Defense risk-based multi-factor authentication ensures all protected files are shielded from ransomware and other threats.
Ransomware simply can’t encrypt what it cannot access. Since Data Defense is centrally managed, admins can instantly initiate a lock on protected data when threats are detected on any system.
The Blueshift SOC can remotely lock down all files during a security incident, without disrupting productivity.
Zero trust principles enforced at the data layer prevent data theft and exfiltration by unauthorized users, processes and malware. Folders and individual files can be designated for protection, requiring step-up authentication to access them.
Data Defense can apply these protections automatically by file type and/or location. For example, policies can be configured to protect all files with a .XLS extension or within the Documents folder.
Files remain encrypted, only accessible by trusted wherever they go.
Cigent’s Data Defense software, fully-managed by Blueshift 24×7 Security Operations Center, is configured by policy in the management console to put all desired files into a risk-based threat-aware state. Policies can be set by file type (extension) and/or by location (folder). It protects files on the local PC, network file shares, and external media.
In normal operations, users work as they always do with no impact to their user experience. During Shields Up mode, users will be required to use multi-factor authentication to access protected files.
Always on – requires authentication to access protected files
Dynamic – requires authentication during a “Shields Up” condition
File access controls that only allow the trusted user to access individual files with MFA.
Files remain encrypted, only accessible by trusted users wherever they go.
Good signed applications are added via the publisher’s signature eliminating the need for whitelisting hashes for past and future applications.
A novel approach to the creation and storage of credentials that make credential access impossible.
Files are protected on PCs, when synced to clouds, stored on NAS, or if users inadvertently share them with unintended parties.
The Blueshift SOC can remotely lock down all files during a security incident, without disrupting productivity.
Cigent Data Defense Shields Up adds multi-factor authentication to ensure all protected files are shielded from access by cyber criminals and malware. There are multiple ways to activate Shields Up mode, including:
DATA DEFENSE
Blueshift XDR offers optional configuration, management, and monitoring of Cigent® Data Defense for Windows and Self Defending Storage. These additional layers of data protection can be proactively utilized to protect sensitive data at all times from ransomware and data theft, even in the event of a cybersecurity incident.
MANAGER
TRANSFORM YOUR APPROACH TO ENDPOINT ENCRYPTION AND COMPLIANCE WITH CIGENT BITLOCKER MANAGER
BitLocker Manager, powered by Cigent, is a new and affordable cloud-based console that eliminates many of the headaches commonly associated with BitLocker encryption and provides efficient BitLocker deployment, management, and reporting, ensuring robust protection and compliance.
BitLocker Manager Simplifies:
BITLOCKER MANAGER COMBINED WITH CIGENT DATA DEFENSE PROTECTS FILES FROM RANSOMWARE
Once BitLocker files are unlocked, post boot protections of sensitive data are deployed using Multi-Factor Authentication and FIPS certified encryption at the file level.
Zero-trust MFA prevents ransomware and remote adversaries from accessing / copying / moving files and can be invoked by the SOC during an incident or configured as always required for sensitive files.
Collects detailed information on each device, including metrics such as device details, protection status, encryption method, and more.
Supports multiple key protectors to ensure encryption keys are securely locked, with recovery options readily available.
Provides real-time encryption and decryption statuses, facilitating swift troubleshooting and management.
Ensures devices are recoverable using key protectors, enabling user access with a recovery key if necessary.
Seamlessly integrates with Active Directory, allowing for the import and export of crucial endpoint and user information.
Offers comprehensive, customizable reporting for all BitLocker-related activities, ensuring compliance and facilitating audits with detailed historical reports.
Learn How BitLocker Manager Simplifies: