Organizations we support
Military
Defense Community
Sensitive and Classified Materials at the Edge
dib-star
Defense Industrial Base
Safeguard Sensitive and Classified Data at the Edge
Intel (2)
Intelligence and Special Ops Community
Secret Data in Extreme Environments
FedCiv-2
Federal Civilian Solutions
Protection of Sensitive Data from Lost Device and Remote Attacks
Devices we protect
Frame 84
Servers / Enterprise
Frame 85
External Media
Industrial Control Systems
Industrial Control Systems
Frame 87(1)
Unmanned Vehicles
Portfolio
Products
Who we partner with
Handshake
Partnership
Cigent Ecosystem of Device and Service Partners
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Blog
Read articles on all things cyber security.
Learn More About Cigent
News from Cigent
4 min read
Edge computing demands robust security to protect ..
4 min read
Data destruction, data erasure, and disk cloning ..
Menu Close
ompare product performance globally, identify competitive opportunities, and make informed leadership decisions. (1)
Servers

Secure Servers Operating at the Edge

Edge computing requirements are increasing the utilization of servers outside of secured data centers. Servers have become compact and lightweight while their processing and storage capacity has increased. Cigent delivers full drive hardware encryption to ensure the integrity of data of servers operating at the edge.

Benefits

Protect Data at Rest

Effective protection of data at rest (DAR) requires layers of protection technology to prevent unauthorized access. Cigent’s solution uses proven, and NSA validated encryption methodology, including full drive AES-256-bit hardware encryption.

AES 256-bit Hardware Encryption

Cigent proven and tested methodology for encryption that has undergone rigorous testing by NSA, DISA and other Federal agencies.

Pre-boot Authentication (PBA)

PBA is a critical security capability to prevent adversary from circumventing full drive encryption. PBA provides a separate, secure authentication prior to initiating boot. Cigent PBA has been validated by NSA for CSfC for DAR.

Multifactor Authentication (MFA)

Optional configuration with PBA provides MFA capability requiring use of both U/NPassword and smart card (CAC).

external media
Component List

CSfC DAR Component List

To ensure sensitive data is secured from malicious actors, NSA requires layered protections. Cigent, with its drive partners provides a single CSfC-compliant Data at Rest (DAR) solution.

Efficient Administration

Enterprise Administration

Cigent is unique in providing scalable management of Secure Storage including on prem and cloud management console and Command Line Interface (CLI) tool that runs in Linux and Windows.

Advanced and Persistent Threat Protection - Cobalt Blue-1

Advanced Data Security

Military grade encryption is the foundation, but advanced adversaries have multiple methods of compromising data. Cigent features deliver unparallel protection including prevention of cloning and wiping.

Layout 1
Portfolio

Secure Storage Solutions for Servers

Cigent offers a portfolio of secured storage options to meet mission requirements.

01.

Secure Enterprise Storage Alpha

Features include full drive hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, data erasure, and crypto and full block erasure.

02.

Secure Enterprise Storage CSfC Alpha

NSA CSfC DAR Component List. Features include full drive hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, data erasure, and crypto and full block erasure.

03.

Secure Boot 2280 SSD Bravo

A boot drive is a storage device that contains the files needed to start a computer's operating system (OS) or firmware when it is turned on or restarted. Cigent ensures these critical drives are protected with features including full drive hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, verified data erasure, and command logs.

Features

Server Solution Capabilities

Encryption and PBA provide foundational data security, but evolving sophisticated adversaries present additional risk. Cigent provides portfolio of cyber security features to mitigate risk.
Administration
Beyond the encryption of data, organizations also are required to address other requirements including recovering and destroying data on returned systems, incident response, and policy reporting. For key management, compliance reporting, policy setting, and deployment automation, Cigent provides an enterprise management console that can be deployed in the cloud or on premises and a Command Line Interface (CLI) tool that runs in Linux and Windows.
Hidden Partitions
All Cigent Secure Storage provides the option to create hidden partition generating enclaves to store sensitive data preventing an adversary from discovering even the existence of the data. The hidden partitions are unreadable at the sector level even after logging onto the device until unlocked using step-up authentication.
Cloning and Wiping Prevention
All Cigent Secure Storage protect against illicit wiping and cloning. Data at rest protection is protected with full drive hardware encryption that locks all ranges. Cigent is unique in also preventing cloning when the device is in use through its ability to create hidden partitions. The hidden partitions also lock all ranges preventing wiping and cloning. These partitions also provide hidden environments to store sensitive data preventing an adversary from discovering even the existence of the data.
Verified Data Erasure
Patented technology that ensures all data on a drive has been permanently deleted. Ability to locally or remotely execute a cleanse that erases all data via crypto and block erasure followed by block-by-block validation. Solution provides confidence in emergency data destruction situations, addresses risk from emerging quantum capabilities, and provides potential for drive reuse.
Untitled design (38)

The Cigent Advantage

Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).

To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.

Rectangle 3(2)
Resources / Blog
More from Cigent
4 min read

Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge

Edge computing demands robust security to protect sensitive data from unauthorized ..

4 min read

Disk Cloning and Data Destruction to Prevent Data Security Issues

Data destruction, data erasure, and disk cloning all play a role in data security--and ..

4 min read

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules

Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..

Frequently Asked Questions

Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.

Why is it important to protect data on remote Servers?

Servers have become more compact and more flexible resulting in an increasing number deployed outside of traditional data centers. Remotely deployed servers are at risk of loss or theft potentially exposing the significant data that resides on them. Protection of data on servers requires the same protection for data as PCs including full drive encryption utilizing pre boot authentication.

Why do I need hardware encryptions vs relying on software encryption?

Protecting sensitive data from advanced threat actors requires layers of protection. Software encryption provides a basic level of protection but can be defeated using a variety of techniques and technologies. This is why the NSA, DISA, NIAP and other leading experts require full drive hardware encryption to meet standards including CSfC for data at rest and FIPS 140-2. Ideally organizations use a combination of software and hardware encryption with pre boot authentication and multifactor authentication providing layers of protection that can defeat the most sophisticated threat actors.

What types of drives does Cigent Offer?

Cigent offers secure storage on U.2 SSD which is the standard storage for workstations and remote servers. The U.2 SSD provides AES 256 full drive encryption that has been validated by leading Federal agencies including NIST, NSA, and NIAP.

What is cloning and wiping?

Cloning and wiping are common attacks where an adversary will copy or “clone” a drive and/ or erase or “wipe” a drive. Clone and wipe attacks can take place when a device is at rest or in use. When a device is in use an adversary with physical access can execute an attack in only a few seconds. Cigent prevents cloning and wiping by locking all data ranges. Utilizing hidden partitions data remains protected even when a device is unlocked.

Still have questions?

Learn more about Cigent and our solutions by downloading our company overview.

Card

Cigent’s Federal Data Protection Solutions are second to none

Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.