The Cicada advantage.
Eliminate the Security Blind Spot
Active computers in operation outside the physical security once provided by the office environment pose a serious challenge to those responsible assuring the security of stored or accessible data. Cicada is the only security product to protect against physical threat by actively detecting attempted theft, or tamper, and responsively invoke protective actions.
Cicada, a complementary solution
Cicada does not replace existing authentication, encryption or other end point security. In fact, the Cicada complements these technologies by adding visibility and protection against risks which are not visible to them.
The Cicada can be used as an additional authentication factor for local host or network authentication. Each Cicada device has an embedded unique Electronic Serial Number (ESN) which can be used as an additional authentication factor, enhancing the effectiveness of your present authentication model. Natively recognized by Cisco, Avaya, Juniper, and other authentication gateway technologies, the Cicada can be integrated as a valuable addition to most Single Sign-On and Federated Identity environments.
Enhanced Cicada Protection.
Cicada’s Monitoring Service subscription automatically delivers event notification alerts via SMS or email the moment compromise or network service interruption is detected.
Practical, Cost-Effective Mobile Data and Asset Protection
Cicada provides comprehensive anti-theft and anti-tamper solution, enabling quick, cost-effective protection for data mobile assets. More than a theft prevention solution, Cicada safeguards data from tamper, and unauthorized access, providing strong real-time security for confidential and private information.
Smart, Policy Based Technology
As each user may have differing work habits, the Cicada provides a flexible and easy to manage security policy that can be adapted to each users specific work habits or environment. Some of the trigger sources monitored by Cicada include:
- Power state change
- Network link state change
- Bluetooth device link state
- Insertion of writable media
- Peripheral insertion or removal
- Compliance to Data Privacy Regulations
The requirement to demonstrate comprehensive compliance to regulatory privacy objectives throughout your organization is critical to preventing fines, and liabilities which can be imposed due to information exposure. With the addition of Cicada physical threat aware technologies you extend your security visibility to ensure that all confidential information is protected from exposure the moment attempted theft or tamper occurs.