Organizations we support
Military
Defense Community
Sensitive and Classified Materials at the Edge
dib-star
Defense Industrial Base
Safeguard Sensitive and Classified Data at the Edge
Intel (2)
Intelligence and Special Ops Community
Secret Data in Extreme Environments
FedCiv-2
Federal Civilian Solutions
Protection of Sensitive Data from Lost Device and Remote Attacks
Devices we protect
Frame 84
Servers / Enterprise
Frame 85
External Media
Industrial Control Systems
Industrial Control Systems
Frame 87(1)
Unmanned Vehicles
Portfolio
Products
Who we partner with
Handshake
Partnership
Cigent Ecosystem of Device and Service Partners
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Blog
Read articles on all things cyber security.
Learn More About Cigent
News from Cigent
4 min read
Edge computing demands robust security to protect ..
4 min read
Data destruction, data erasure, and disk cloning ..
Menu Close
Rectangle 1 (1)
Encryption Solutions

Protect Data on Devices Operating at the Edge

Cigent integrated hardware and software solutions secure data at rest and in use

Trusted By
AFRL
Air Force
Army APG
Army
CRWS
Dept of Justice
DISA
Everfox
GDIT
Intel Community
Navy
NSA-1
SOCOM

About

Cigent ensures the integrity of sensitive data at the edge.

There is a proliferation of diverse endpoints – from PCs, to Servers to Manned and Unmanned Vehicles all at the edge with sensitive data that is vulnerable to compromise. Cigent empowers organizations to efficiently achieve compliance requirements and ensure the integrity of data at the edge and ensure their mission critical data is protected.

iStock-1224578391
Compliance-1

Meet Compliance

Cigent enables organization to meet compliance requirements with full drive hardware encryption and PBA including CSfC for DAR, FIPS 140-2, NIST 800-171, NSSIF (UK).

Portfolio

Unparallel Coverage

Cigent offers the broadest range of secure storage coverage including PCs, Servers, External Media, Industrial Control Systems, and Manned and Unmanned Vehicles.

Advanced and Persistent Threat Protection - Cobalt Blue-1

Advanced Data Protection

Cigent ensures data is protected with patented capabilities that prevent cloning and wiping, thwart advanced adversaries, and verifies permanent data erasure.

Layout

Defense Community

Organization protecting secure sensitive & classified  data

  • Meet CSfC for DAR Compliance
  • Full drive hardware encryption with PBA
  • Advanced data protection for a variety of edge devices

Intelligence Community

Hide in plain sight with advanced threat protection

  • Most secure commercially available endpoint data protection
  • Solutions designed with and for Intel Community
  • Experience developing and fielding custom solutions

Federal Civilian

Prevent ransomware, data exfiltration, and data tampering

  • Protect data at rest and in use with single efficient solution
  • Proactive data protection prevents data attacks
  • Minimal administrative overhead with set and forget capabilities
test and validated by leading Federal Agencies - NSA, NIAP, FIPS 140-2, DISA, and CSfC for DAR, among others.
8 Central Security Service
7 IQT
6 CSfC
4 National Security Agency
3 FIPS Validated
1 NIST
Vector

Praise for Cigent

Layout 1
Devices

Protect data on your devices on the edge.

Cigent provides the most extensive portfolio of secured storage devices providing a single trusted partner to ensure all endpoint data is protected.
PCs
PCs that contain sensitive data must meet NSA CSfC for DAR requirements. Cigent delivers secured storage solutions that effectively and efficiently meet compliance and protect data.
Servers
Edge computing requirements are increasing the utilization of servers. Cigent protects data on servers with hardware encryption and PBA meeting NSA CSfC for DAR requirements.
External Media
Cigent provides a portfolio of hardware encrypted enabled external media including flash drives, external storage, and SD and MicroSD cards.
Industrial Control Systems
Cigent protects data collected, processed, and stored by Industrial Control Systems (ICS) with multiple Secure Storage Solutions with integrated hardware and software capabilities.
Unmanned Vehicles
The Cigent secure storage portfolio protects sensitive data on unmanned vehicles with multiple configurations meeting industrial and automotive temperature requirements.
Untitled design (35)

ebook

Discover Secure Storage Solutions

Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Read our extensive eBook to learn more.

Cigent-Secure-Storage-White-Paper-11-15-2024_09_38_AM

Resources / Blog
The latest from Cigent
4 min read

Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge

Edge computing demands robust security to protect sensitive data from unauthorized ..

4 min read

Disk Cloning and Data Destruction to Prevent Data Security Issues

Data destruction, data erasure, and disk cloning all play a role in data security--and ..

4 min read

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules

Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..

Frequently Asked Questions

Frequently asked questions ordered by popularity. Remember that if the visitor has not committed to the call to action, they may still have questions (doubts) that can be answered.

What does Cigent do?

Cigent protects data on devices operating at the edge from unauthorized access. Cigent solutions secures data at rest with layered protection including hardware encryption, pre-boot authentication, and multifactor authentication. Cigent also ensures data integrity when the device is in use preventing wiping and cloning and other data attacks.

How does Cigent work?

To prevent sophisticated adversaries from unauthorized access requires layered protection. The foundation of Cigent solution is 256-AES full drive hardware encryption with pre-boot and multifactor authentication. These capabilities have been validated by agencies including NSA and NIAP. Additionally, Cigent provides capabilities that ensure the integrity of data through its lifecycle including hidden partitions, storage-embedded AI, and verified data erasure.

What is data-at-rest encryption?

Data at rest encryption traditionally refers to the encryption of data when the device is asleep or powered-off. Data at rest encryption seeks to prevent adversaries who gain physical access to the device would seek to extract sensitive data. Cigent uses AES 256 full drive hardware encryption with pre-boot and multifactor authentication. In addition, Cigent uses zero-trust access to control to also protect data when a device is in use. This is with hidden partitions that maintain encryption until it is accessed with step-up authentication.

What devices does Cigent protect?

Cigent provides the widest breadth of secure storage solutions all utilizing hardware encryption. These includes: PCs supporting both M.2 2280 and the emerging M.2 2230 standard, remote servers and NAS devices with U.2 drives, external media with flash drives, encrypted external drives, SD and Micro SD cards, and embedded for SSD BGA.

Does Cigent help with certifications?

Yes, Cigent Secure Storage Solutions can support organizations meeting Commercial Solutions for Classified (CSfC) for data at rest including pre-boot authentication requirements. Cigent solutions can also meet FIPS 140-2 and 140-3 standards. Additionally, Cigent can address requirements from Executive Order 14028 including encryption of data at rest, multi-factor authentication, and the utilization of zero-trust access control. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).

Still have questions?

Learn more about Cigent and our solutions by downloading our company overview.

Card

Cigent Partners

Cigent partners with some of the top manufacturers and firms.