The Cicada advantage.

Eliminate the Security Blind Spot

Active computers in operation outside the physical security once provided by the office environment pose a serious challenge to those responsible assuring the security of stored or accessible data. Cicada is the only security product to protect against physical threat by actively detecting attempted theft, or tamper, and responsively invoke protective actions.

Cicada, a complementary solution

Cicada does not replace existing authentication, encryption or other end point security. In fact, the Cicada complements these technologies by adding visibility and protection against risks which are not visible to them.

Enhancing Authentication

The Cicada can be used as an additional authentication factor for local host or network authentication. Each Cicada device has an embedded unique Electronic Serial Number (ESN) which can be used as an additional authentication factor, enhancing the effectiveness of your present authentication model. Natively recognized by Cisco, Avaya, Juniper, and other authentication gateway technologies, the Cicada can be integrated as a valuable addition to most Single Sign-On and Federated Identity environments.

Enhanced Cicada Protection.

Cicada’s Monitoring Service subscription automatically delivers event notification alerts via SMS or email the moment compromise or network service interruption is detected.

Practical, Cost-Effective Mobile Data and Asset Protection

Cicada provides comprehensive anti-theft and anti-tamper solution, enabling quick, cost-effective protection for data mobile assets. More than a theft prevention solution, Cicada safeguards data from tamper, and unauthorized access, providing strong real-time security for confidential and private information.

Smart, Policy Based Technology

As each user may have differing work habits, the Cicada provides a flexible and easy to manage security policy that can be adapted to each users specific work habits or environment. Some of the trigger sources monitored by Cicada include:

Power state change
Network link state change
Bluetooth device link state
Insertion of writable media
Peripheral insertion or removal
Compliance to Data Privacy Regulations

The requirement to demonstrate comprehensive compliance to regulatory privacy objectives throughout your organization is critical to preventing fines, and liabilities which can be imposed due to information exposure. With the addition of Cicada physical threat aware technologies you extend your security visibility to ensure that all confidential information is protected from exposure the moment attempted theft or tamper occurs.