Organizations we support
Military
Defense Community
Sensitive and Classified Materials at the Edge
dib-star
Defense Industrial Base
Safeguard Sensitive and Classified Data at the Edge
Intel (2)
Intelligence and Special Ops Community
Secret Data in Extreme Environments
FedCiv-2
Federal Civilian Solutions
Protection of Sensitive Data from Lost Device and Remote Attacks
Devices we protect
Frame 84
Servers / Enterprise
Frame 85
External Media
Industrial Control Systems
Industrial Control Systems
Frame 87(1)
Unmanned Vehicles
Portfolio
Products
Who we partner with
Handshake
Partnership
Cigent Ecosystem of Device and Service Partners
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Blog
Read articles on all things cyber security.
Learn More About Cigent
News from Cigent
4 min read
Edge computing demands robust security to protect ..
4 min read
Data destruction, data erasure, and disk cloning ..
Menu Close
Hero (1)
PCs

Protection for Data on PCs

Cigent ensures that data on PCs remains protected from unauthorized access with a single integrated hardware and software solution providing layered protection.

Benefits

Protect Data at Rest

PCs are the critical productivity tools for processing and storing data at the edge. Emerging AI capabilities will accelerate their ability to enable missions. But PCs operating at the edge are at risk of unauthorized data access exposing sensitive data. Layered protections that address the data lifecycle are imperative to ensure the integrity of sensitive data.

AES 256-bit Hardware Encryption

Cigent proven and tested methodology for encryption that has undergone rigorous testing by NSA, DISA and other Federal agencies.

Pre-boot Authentication (PBA)

PBA is a critical security capability to prevent adversary from circumventing full drive encryption. PBA provides a separate, secure authentication prior to initiating boot. Cigent PBA has been validated by NSA for CSfC for DAR.

Multifactor Authentication (MFA)

Optional configuration with PBA provides MFA capability requiring use of both U/NPassword and smart card (CAC).

Untitled design (35)
Data at Rest Encryption

Protect Data at Rest

Cigent utilizes AES 256 full drive hardware encryption with pre boot and multifactor authentication. The solutions has been tested and validated by NSA, DISA, NIST and other agencies.

Efficient Administration

Enterprise Administration

Cigent provides an enterprise management console available in the cloud and on premise and a command line interface available on Windows and Linux. Capabilities include key management, compliance reporting, deployment automation and others.

Compliance-1

Meet Compliance

Cigent Secure Storage solutions meet critical requirements including CSfC for DAR, FIPS 140-2 and 140-3, and address EO 14028 encryption, multifactor authentication, and zero trust requirements.

Advance Data Security

Advanced Data Protection

Layers of protection provide security throughout the data lifecycle ensuring the integrity for data at rest, while the device is in use, and upon mission completion.

Layout 1
Portfolio

Secure Storage Solutions for PC

Cigent offers integrated solutions for 2280 and 2230 supporting multiple compliance requirements.

01.

2280 Secure Storage

2280 is the legacy standard for storage configuration on PCs. Drive options include:

Secure Drive 2280 CSfC SSD Bravo.

NSA CSfC DAR Component List. Key features include full drive hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, verified data erasure, and command logs.

Secure Drive 2280 FIPs SSD Bravo

FIPS 140-2 Certified. Key features include full drive hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, verified data erasure, and command logs.

Secure Drive 2280 SSD Charlie

Key features include full drive hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, crypto and full block erasure, command logs, AI secured storage, and verified data erasure.

02.

Secure Drive 2230 SSD Alpha

Features include full drive hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, data erasure, and crypto and full block erasure.

The Secure Drive 2230 utilizes the same architecture as 2280, including the NSA approved PBA.

2230 is an emerging standard for device manufactures storage configurations including Microsoft Surface, Dell Latitude, and HP EliteBooks.

Features

Secure Storage Solution Capabilities

Encryption and PBA provide foundational data security, but evolving sophisticated adversaries present additional risk. Cigent provides portfolio of cyber security features to mitigate risk.
Administration
Beyond the encryption of data, organizations also are required to address other requirements including recovering and destroying data on returned systems, incident response, and policy reporting. For key management, compliance reporting, policy setting, and deployment automation, Cigent provides an enterprise management console that can be deployed in the cloud or on premises and a Command Line Interface (CLI) tool that runs in Linux and Windows.
Hidden Partitions
All Cigent Secure Storage provides the option to create hidden partition generating enclaves to store sensitive data preventing an adversary from discovering even the existence of the data. The hidden partitions are unreadable at the sector level even after logging onto the device until unlocked using step-up authentication.
Cloning and Wiping Prevention
All Cigent Secure Storage protect against illicit wiping and cloning. Data at rest protection is protected with full drive hardware encryption that locks all ranges. Cigent is unique in also preventing cloning when the device is in use through its ability to create hidden partitions. The hidden partitions also lock all ranges preventing wiping and cloning. These partitions also provide hidden environments to store sensitive data preventing an adversary from discovering even the existence of the data.
Verified Data Erasure
Patented technology that ensures all data on a drive has been permanently deleted. Ability to locally or remotely execute a cleanse that erases all data via crypto and block erasure followed by block-by-block validation. Solution provides confidence in emergency data destruction situations, addresses risk from emerging quantum capabilities, and provides potential for drive reuse.
AI Secured Storage
Only AI embedded in storage continually monitors data access patterns instantly securing data when anomalous behavior is detected. Detects if alternate O/S boot approach is attempted. AI is tamper proof providing continuous monitoring of sensitive data.
Secure Data Logs
Cigent captures every data transaction in secured, tamper-proof logs. Information be used to detect malicious insider activity and provide valuable forensics.
Untitled design (38)

The Cigent Advantage

Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).

To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.

Rectangle 3(2)
Resources / Blog
More from Cigent
4 min read

Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge

Edge computing demands robust security to protect sensitive data from unauthorized ..

4 min read

Disk Cloning and Data Destruction to Prevent Data Security Issues

Data destruction, data erasure, and disk cloning all play a role in data security--and ..

4 min read

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules

Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..

Frequently Asked Questions

Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.

Why is it important to protect data on PCs?

PCs are the primary user productivity devices. They continue to ingest, process and store information that may include sensitive and classified data. Many PCs operate in insecure environments where an adversary may gain physical access to the device. Without adequate protection adversaries can extract, modify, encrypt or destroy data. Attacks such as wiping and cloning only take seconds to execute. An adversary with longer access can employ advanced data recovery that includes a variety of techniques to defeat different endpoint protections.

Why do I need hardware encryptions vs relying on software encryption?

Protecting sensitive data from advanced threat actors requires layers of protection. Software encryption provides a basic level of protection but can be defeated using a variety of techniques and technologies. This is why the NSA, DISA, NIAP and other leading experts require full drive hardware encryption to meet standards including CSfC for data at rest and FIPS 140-2. Ideally organizations use a combination of software and hardware encryption with pre boot authentication and multifactor authentication providing layers of protection that can defeat the most sophisticated threat actors.

What types of drives does Cigent Offer?

Cigent offers secure storage on M.2 2280 SSD which is the legacy standard for storage in PCs. The emerging configuration in PCs is M.2 2230 SSD which is the standard on all Microsoft Surface Devices and many of the newest Dell Latitude and Precision PCs and HP Elite Books and HP Workstations.

Does Cigent address certifications?

Yes, Cigent Secure Storage Solutions can support organizations meeting Commercial Solutions for Classified (CSfC) for data at rest including pre-boot authentication requirements. Cigent solutions can also meet FIPS 140-2 and 140-3 standards. Additionally, Cigent can address requirements from Executive Order 14028 including encryption of data at rest, multi-factor authentication, and the utilization of zero-trust access control. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).

What is cloning and wiping?

Cloning and wiping are common attacks where an adversary will copy or “clone” a drive and/ or erase or “wipe” a drive. Clone and wipe attacks can take place when a device is at rest or in use. When a device is in use an adversary with physical access can execute an attack in only a few seconds. Cigent prevents cloning and wiping by locking all data ranges. Utilizing hidden partitions data remains protected even when a device is unlocked.

Still have questions?

Learn more about Cigent and our solutions by downloading our company overview.

Card

Cigent’s Federal Data Protection Solutions are second to none

Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.