PCs
Protection for Data on PCs
Cigent ensures that data on PCs remains protected from unauthorized access with a single integrated hardware and software solution providing layered protection.
Benefits
Protect Data at Rest
PCs are the critical productivity tools for processing and storing data at the edge. Emerging AI capabilities will accelerate their ability to enable missions. But PCs operating at the edge are at risk of unauthorized data access exposing sensitive data. Layered protections that address the data lifecycle are imperative to ensure the integrity of sensitive data.
AES 256-bit Hardware Encryption
Cigent proven and tested methodology for encryption that has undergone rigorous testing by NSA, DISA and other Federal agencies.
Pre-boot Authentication (PBA)
PBA is a critical security capability to prevent adversary from circumventing full drive encryption. PBA provides a separate, secure authentication prior to initiating boot. Cigent PBA has been validated by NSA for CSfC for DAR.
Multifactor Authentication (MFA)
Optional configuration with PBA provides MFA capability requiring use of both U/NPassword and smart card (CAC).
Protect Data at Rest
Cigent utilizes AES 256 full drive hardware encryption with pre boot and multifactor authentication. The solutions has been tested and validated by NSA, DISA, NIST and other agencies.
Enterprise Administration
Cigent provides an enterprise management console available in the cloud and on premise and a command line interface available on Windows and Linux. Capabilities include key management, compliance reporting, deployment automation and others.
Meet Compliance
Cigent Secure Storage solutions meet critical requirements including CSfC for DAR, FIPS 140-2 and 140-3, and address EO 14028 encryption, multifactor authentication, and zero trust requirements.
Advanced Data Protection
Layers of protection provide security throughout the data lifecycle ensuring the integrity for data at rest, while the device is in use, and upon mission completion.
Portfolio
Secure Storage Solutions for PC
Cigent offers integrated solutions for 2280 and 2230 supporting multiple compliance requirements.
01.
2280 Secure Storage
2280 is the legacy standard for storage configuration on PCs. Drive options include:
Secure Drive 2280 CSfC SSD Bravo.
NSA CSfC DAR Component List. Key features include full drive hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, verified data erasure, and command logs.
Secure Drive 2280 FIPs SSD Bravo
FIPS 140-2 Certified. Key features include full drive hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, verified data erasure, and command logs.
Secure Drive 2280 SSD Charlie
Key features include full drive hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, crypto and full block erasure, command logs, AI secured storage, and verified data erasure.
02.
Secure Drive 2230 SSD Alpha
Features include full drive hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, data erasure, and crypto and full block erasure.
The Secure Drive 2230 utilizes the same architecture as 2280, including the NSA approved PBA.
2230 is an emerging standard for device manufactures storage configurations including Microsoft Surface, Dell Latitude, and HP EliteBooks.
Features
Secure Storage Solution Capabilities
The Cigent Advantage
Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).
To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.
Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge
Edge computing demands robust security to protect sensitive data from unauthorized ..
Disk Cloning and Data Destruction to Prevent Data Security Issues
Data destruction, data erasure, and disk cloning all play a role in data security--and ..
FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules
Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..
Frequently Asked Questions
Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.
PCs are the primary user productivity devices. They continue to ingest, process and store information that may include sensitive and classified data. Many PCs operate in insecure environments where an adversary may gain physical access to the device. Without adequate protection adversaries can extract, modify, encrypt or destroy data. Attacks such as wiping and cloning only take seconds to execute. An adversary with longer access can employ advanced data recovery that includes a variety of techniques to defeat different endpoint protections.
Protecting sensitive data from advanced threat actors requires layers of protection. Software encryption provides a basic level of protection but can be defeated using a variety of techniques and technologies. This is why the NSA, DISA, NIAP and other leading experts require full drive hardware encryption to meet standards including CSfC for data at rest and FIPS 140-2. Ideally organizations use a combination of software and hardware encryption with pre boot authentication and multifactor authentication providing layers of protection that can defeat the most sophisticated threat actors.
Cigent offers secure storage on M.2 2280 SSD which is the legacy standard for storage in PCs. The emerging configuration in PCs is M.2 2230 SSD which is the standard on all Microsoft Surface Devices and many of the newest Dell Latitude and Precision PCs and HP Elite Books and HP Workstations.
Yes, Cigent Secure Storage Solutions can support organizations meeting Commercial Solutions for Classified (CSfC) for data at rest including pre-boot authentication requirements. Cigent solutions can also meet FIPS 140-2 and 140-3 standards. Additionally, Cigent can address requirements from Executive Order 14028 including encryption of data at rest, multi-factor authentication, and the utilization of zero-trust access control. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).
Cloning and wiping are common attacks where an adversary will copy or “clone” a drive and/ or erase or “wipe” a drive. Clone and wipe attacks can take place when a device is at rest or in use. When a device is in use an adversary with physical access can execute an attack in only a few seconds. Cigent prevents cloning and wiping by locking all data ranges. Utilizing hidden partitions data remains protected even when a device is unlocked.
Still have questions?
Learn more about Cigent and our solutions by downloading our company overview.
Cigent’s Federal Data Protection Solutions are second to none
Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.