Organizations we support
Military
Defense Community
Sensitive and Classified Materials at the Edge
dib-star
Defense Industrial Base
Safeguard Sensitive and Classified Data at the Edge
Intel (2)
Intelligence and Special Ops Community
Secret Data in Extreme Environments
FedCiv-2
Federal Civilian Solutions
Protection of Sensitive Data from Lost Device and Remote Attacks
Devices we protect
Frame 84
Servers / Enterprise
Frame 85
External Media
Industrial Control Systems
Industrial Control Systems
Frame 87(1)
Unmanned Vehicles
Portfolio
Products
Who we partner with
Handshake
Partnership
Cigent Ecosystem of Device and Service Partners
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Blog
Read articles on all things cyber security.
Learn More About Cigent
News from Cigent
4 min read
Edge computing demands robust security to protect ..
4 min read
Data destruction, data erasure, and disk cloning ..
Menu Close
Devices - OpTech
Industrial Control Systems

Protecting Data on Industrial Control Systems

Industrial Control Systems (ICS) capabilities are advancing rapidly optimizing efficiency and reducing or eliminating manual tasks. Subsequently ICS is collecting, processing, and warehousing increasing volumes of data that may be sensitive and or classified and needs to be protected.

Benefits

Protect Data at Rest

Cigent provides a portfolio of Secure Storage Solutions for Industrial Control Systems. With integrated hardware and software capabilities they deliver layered protection to secure data at rest and throughout its lifecycle. Cigent solutions have been tested and validated by leading Federal agencies including NSA, NIST, DISA, and NIAP.

Rectangle 3-1
Data at Rest Encryption

Data at Rest Protection

Cigent Secure Storage Solutions utilize AES 256 full drive hardware encryption to ensure data at rest (DAR) is protected. The full drive encryption is complemented with pre-boot authentication (PBA) and multifactor authentication (MFA) providing a comprehensive DAR protection solution. Cigent technology and methodology has been tested and vetted and meets FIPS 140-2 and CSfC for DAR standards.

Frame 93 (2)

Verified Data Erasure

Various use cases will require data to be permanently erased from ICS devices. Cigent provides crypto and block erasure. Additionally, it includes a patented capability that executes a block-by-block analysis verifying all data has been permanently erased.

Frame 93 (6)

Insider Threat Logs

Cigent maintains incorruptible logs of all data activity. The logs record every data transaction stored in an encrypted document. Even sophisticated actions like booting directly from USB drive will not circumvent the logs providing foolproof log of activities.

Efficient Administration

Enterprise Administration

Cigent is unique in providing scalable management of Secure Storage including on prem and cloud management console and Command Line Interface (CLI) tool that runs in Linux and Windows.

Features

Industrial Control Systems

Cigent Secure Storage Solutions complement full drive hardware encryption with advanced protection capabilities to secure data from threats throughout its lifecycle.
Administration
Beyond the encryption of data, organizations also are required to address other requirements including recovering and destroying data on returned systems, incident response, and policy reporting. For key management, compliance reporting, policy setting, and deployment automation, Cigent provides an enterprise management console that can be deployed in the cloud or on premises and a Command Line Interface (CLI) tool that runs in Linux and Windows.
Hidden Partitions
All Cigent Secure Storage provides the option to create hidden partition generating enclaves to store sensitive data preventing an adversary from discovering even the existence of the data. The hidden partitions are unreadable at the sector level even after logging onto the device until unlocked using step-up authentication.
Cloning and Wiping Prevention
All Cigent Secure Storage protect against illicit wiping and cloning. Data at rest protection is protected with full drive hardware encryption that locks all ranges. Cigent is unique in also preventing cloning when the device is in use through its ability to create hidden partitions. The hidden partitions also lock all ranges preventing wiping and cloning. These partitions also provide hidden environments to store sensitive data preventing an adversary from discovering even the existence of the data.
Data Erasure
Provide the ability to locally or remotely execute a cleanse that erases all data via crypto and block erasure. Cigent also provides patented capability to analyze each block to ensure all data has been permanently erased.
Secure Data Logs
Cigent captures every data transaction in secured, tamper-proof logs. Information be used to detect malicious insider activity and provide valuable forensics.
Rectangle 3(1)

Cigent Advantages

Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).

To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.

Rectangle 3(2)
Resources / Blog
More from Cigent
4 min read

Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge

Edge computing demands robust security to protect sensitive data from unauthorized ..

4 min read

Disk Cloning and Data Destruction to Prevent Data Security Issues

Data destruction, data erasure, and disk cloning all play a role in data security--and ..

4 min read

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules

Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..

Frequently Asked Questions

Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.

What is Operational Technology?

Operational technology (OT) is a broad range of hardware and software that monitors and controls industrial equipment, processes, and events. OT systems can detect or directly change these systems through monitoring and control.

Why do I need to protect data on Operational Technology?

Operational technology capabilities are advancing rapidly optimizing efficiency and reducing or eliminating manual tasks. The development and incorporation of AI will further accelerate OT capabilities. Subsequently OT will be collecting, processing, and warehousing increasing volumes of data that may be sensitive and or classified. Like other devices OT are susceptible to unauthorized data access particularly when adversary has direct access to the device. Protection of data at rest with full drive hardware encryption provides foundational security preventing unauthorized access of data on OT devices.

What types of storage options does Cigent offer for Operational Technology?

Cigent provides multiple secure storage to support Unmanned Vehicle operations. These include M.2 2230 SSD that provides full drive hardware encryption, the ability to create up to eight separate hidden partitions, and patented verified data erasure. Additionally, Cigent offers SSD BGA with full drive hardware encryption, the ability to create hidden partitions, and remote and policy data erasure. Both of these drives have Automotive temperature ratings. Additionally, Cigent provides the flexibility and security of hardware encryption on SD and MicroSD cards. These also include the ability to create hidden partitions and data erasure and have Industrial temperature ratings.

Why do I need Embedded Storage?

An increasing array of devices, including manned and unmanned vehicles, are collecting, processing, and storing data. All or some of this data may be of a sensitive nature. If the devices were to be lost, stolen, or captured, it is critical to ensure the integrity of the sensitive data by preventing unauthorized access. Cigent provides full drive hardware encryption for BGA providing robust protection for data. Additionally, users can create hidden partitions that created secure enclaves that are unreadable at the sector level.

What is meant by Embedded Storage?

Embedded storage is a type of storage that is embedded onto a motherboard. It is often designed into a system from the beginning, making it difficult to replace. The benefits of embedded storage include increased reliability due to their dedicated function, lower power consumption, compact size, and the ability to perform real-time operations.

Has the Cigent solutions been validated by external organizations?

Yes, Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).

Still have questions?

Learn more about Cigent and our solutions by downloading our company overview.

Card

Cigent’s Federal Data Protection Solutions are second to none

Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.