(844) 627-8267
(844) 627-8267

Cigent Endpoint Data Protection Stops Ransomware, with Zero-Trust Access Protection | News | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware

FT. MYERS, Fla.–(BUSINESS WIRE)–May 21, 2024–

Cigent® Technology, Inc., the leader in cybersecurity for endpoints and storage devices, today announced the Cigent Endpoint Data Protection Platform that protects data from ransomware, data exfiltration, and data loss. The Endpoint Data Protection Platform provides a comprehensive portfolio of endpoint data offerings.

This page requires Javascript.

Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

kAmxE 😀 E96 7:CDE @H? 4@>>6C4:2= D@=FE:@? E92E AC@E64ED |:4C@D@7E (:?5@HD 6?5A@:?E 56G:46 52E2 6G6CJ E:>6[ 282:?DE 6G6CJ 2EE24:?:>2= :>A24E E@ FD6CD 2?5 >:?:>2= 25>:?:DEC2E:G6 56>2?5D @? x% C6D@FC46D]k^Am

kAm“uF?52>6?E2= 492?86D 2C6 =@?8 @G6C5F6[” D2:5 r:86?E rv~ qC6EE w2?D6?] “%96 56E64E 2?5 C6DA@?5 2AAC@249 😀 :?DF77:4:6?E H:E9 E@52J’D E9C62ED 2D :E 5@6D?’E AC@G:56 AC@E64E:@? @7 6?5A@:?E 52E2 @C 6?23=6 H@CA@CE2?E 42A23:=:EJ E92E H:== 8C@H >@C6 4CF4:2= 2D px\6?23=65 2EE24AC@>:D6] %96 r:86?E !=2E7@C> 😀 2? 6?E:C6=J ?6H 72:=D276 E92E 56=:G6CD 6?5A@:?E AC@E64E:@? 7@C E96 >@56C? H@C E9C62ED[ C6>@E6 @C A9JD:42=[ 2==@HD FD6CD E@ 4@?E:?F6 E@ @A6C2E6 6G6? :7 2 56G:46 92D 366? 4@>AC@>:D65[ 2?5 H:E9 2 FD6C\6>A2E9J 56D:8? E92E >:E:82E6D FD6C :>A24E[ AC6G6?ED 3FC56?:?8 x% 2?5 D64FC:EJ DE277]”k^Am

kAmk6>m%96 w:89 !C:46 @7 x?DF77:4:6?E t?5A@:?E $64FC:EJik^6>m tI:DE:?8 4@>>6C4:2= 6?5A@:?E 2?5 52E2 D64FC:EJ AC@5F4ED 2C6 C6A62E65=J AC@G6? E@ 36 :?67764E:G6 2E DE@AA:?8 C2?D@>H2C6[ >2=H2C6[ 2?5 25G2?465 A6CD:DE6?E E9C62ED 7C@> 5:D23=:?8 6?5A@:?ED] q642FD6 @7 E9:D[ 7F==J k2 9C67lQ9EEADi^^4ED]3FD:?6DDH:C6]4@>^4E^r%n:5lD>2CE=:?AjFC=l9EEADTbpTauTauHHH]>@CA9:D64]4@>Tau9F37DTaua_a_Tada_$E2E6Tada_@7Tada_t?5A@:?ETada_$64FC:EJTada_u:?2=]A57U2>Aj6D966Eldc__dcaaU2>Aj?6HD:E6>:5la_ac_da`gbdcabU2>Aj=2?l6?\&$U2>Aj2?49@ClegTadU2>Aj:?56IlaU2>Aj>5dl6gea54b_5hbgb437ccf4a6bag6c2e4d3Q C6=lQ?@7@==@HQ D92A6lQC64EQmegTk^2m E@ k2 9C67lQ9EEADi^^4ED]3FD:?6DDH:C6]4@>^4E^r%n:5lD>2CE=:?AjFC=l9EEADTbpTauTauHHH]CD24@?76C6?46]4@>TauFD2Tau286?52TauD6DD:@?Taur@D@DJDTada_s2E2Tada_{@DDTada_!C6G6?E:@?Tada_2ETada_E96Tada_6?5A@:?ETada_(9JTada_H@F=5Tada_J@FCTada_s{!Tada_36Tada_2?JH96C6Tada_6=D6U2>Aj6D966Eldc__dcaaU2>Aj?6HD:E6>:5la_ac_da`gbdcabU2>Aj=2?l6?\&$U2>Aj2?49@Clf_TadU2>Aj:?56IlbU2>Aj>5dl4`7eb__5g54acf`__cg_fed_afef3ah3Q C6=lQ?@7@==@HQ D92A6lQC64EQmf_Tk^2m @7 52E2 =@DD :?4:56?ED @44FC 2E E96 6?5A@:?E]k^Am

kAmrJ36C2EE24>:?6?E H:56DAC625 25@AE:@? @7 px 3J 2EE246D[ D@A9:DE:42E:@?[ 2?5 AC64:D6 E2C86E:?8 H:== 6D42=2E6 C2A:5=J]k^Am


Click Here For The Original Source.


National Cyber Security