Organizations we support
Military
Defense Community
Sensitive and Classified Materials at the Edge
dib-star
Defense Industrial Base
Safeguard Sensitive and Classified Data at the Edge
Intel (2)
Intelligence and Special Ops Community
Secret Data in Extreme Environments
FedCiv-2
Federal Civilian Solutions
Protection of Sensitive Data from Lost Device and Remote Attacks
Devices we protect
Frame 84
Servers / Enterprise
Frame 85
External Media
Industrial Control Systems
Industrial Control Systems
Frame 87(1)
Unmanned Vehicles
Portfolio
Products
Who we partner with
Handshake
Partnership
Cigent Ecosystem of Device and Service Partners
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Blog
Read articles on all things cyber security.
Learn More About Cigent
News from Cigent
4 min read
Edge computing demands robust security to protect ..
4 min read
Data destruction, data erasure, and disk cloning ..
Menu Close
Devices - Unmanned
Unmanned Vehicles

Data Protection Solutions for Unmanned Vehicles

Unmanned Vehicles (UxV) have established themselves as an essential element in military and civilian operations. Operating at the edge, sensitive data including valuable proprietary algorithms, mission information, and data gathered during mission is susceptible if the device goes missing. Cigent solutions provide layered protections to ensure the integrity of data on UxV.

Benefits

Data Protection for UxV

Providing layered data protection capabilities across its lifecycle, Cigent supports an array of secure storage options. Protection solutions include 2230 drives, SSD BGA, and SD and MicroSD cards with options that support industrial and automotive temperature standards.

Untitled design (37)
Data at Rest Encryption

Data at Rest Protection

All Cigent Secure Storage Solutions provide AES 256 full drive hardware encryption. 2230 drives include pre boot and multifactor authentication.

Prevent Ransomware & All Other Attacks  - Cobalt Blue 1

Hidden Partitions

Ability to create separate locked partitions where data is unreadable at the sector level. Adversary unable to detect secure enclaves.

Frame 93 (2)

Data Erasure

By policy or remote activation of data erasure utilizing crypto and block erasure. 2230 drives provide block-by-block analysis verifying all data has been erased.

Efficient Administration

Enterprise Administration

Scalable management of Secure Storage including on prem and cloud management console and Command Line Interface (CLI) tool that runs in Linux and Windows.

Layout 1
Portfolio

Secure Storage Solutions for Unmanned Vehicles

Cigent is unique in its ability to provide an array of protected storage designed to meet the rigorous environment of unmanned vehicles.

01.

Secure Drive 2230 SSD Alpha.

Features include full hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, data erasure, crypto and full block erasure.

The Secure Drive 2230 utilizes the same architecture as 2280, including the NSA approved PBA.

02.

Secure Drive SSD BGA Encrypted Alpha.

Meets automotive temperature standards (-40 to 105 C). Features include hardware encryption, enterprise management, cloning and wipe prevention, data erasure, and crypto and full block erasure.

03.

Secure Drive SD Encrypted Alpha.

Provides 64 GB of storage and meets industrial temperature standards. Features include hardware encryption, enterprise management, hidden partitions, cloning and wipe prevention, data erasure, and crypto and full block erasure.

04.

MicroSD Encrypted Alpha.

Provides 64 GB of storage and meets industrial temperature standards. Features include hardware encryption, enterprise management, hidden partitions, cloning and wipe prevention, data erasure, and crypto and full block erasure.

Features

Unmanned Vehicle Solution Capabilities

Encryption and PBA provide foundational data security, but evolving sophisticated adversaries present additional risk. Cigent provides portfolio of cyber security features to mitigate risk.
Administration
Beyond the encryption of data, organizations also are required to address other requirements including recovering and destroying data on returned systems, incident response, and policy reporting. For key management, compliance reporting, policy setting, and deployment automation, Cigent provides an enterprise management console that can be deployed in the cloud or on premises and a Command Line Interface (CLI) tool that runs in Linux and Windows.
Hidden Partitions
All Cigent Secure Storage provides the option to create hidden partition generating enclaves to store sensitive data preventing an adversary from discovering even the existence of the data. The hidden partitions are unreadable at the sector level even after logging onto the device until unlocked using step-up authentication.
Cloning and Wiping Prevention
All Cigent Secure Storage protect against illicit wiping and cloning. Data at rest protection is protected with full drive hardware encryption that locks all ranges. Cigent is unique in also preventing cloning when the device is in use through its ability to create hidden partitions. The hidden partitions also lock all ranges preventing wiping and cloning. These partitions also provide hidden environments to store sensitive data preventing an adversary from discovering even the existence of the data.
Verified Data Erasure
Patented technology that ensures all data on a drive has been permanently deleted. Ability to locally or remotely execute a cleanse that erases all data via crypto and block erasure followed by block-by-block validation. Solution provides confidence in emergency data destruction situations, addresses risk from emerging quantum capabilities, and provides potential for drive reuse. Cigent also provides patented capability to analyze each block to ensure all data has been permanently erased.
Secure Data Logs
Cigent captures every data transaction in secured, tamper-proof logs. Information be used to detect malicious insider activity and provide valuable forensics.
Untitled design (37)-1
Tagline

The Cigent Advantage

Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).

To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.

Rectangle 3(2)
Resources / Blog
More from Cigent
4 min read

Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge

Edge computing demands robust security to protect sensitive data from unauthorized ..

4 min read

Disk Cloning and Data Destruction to Prevent Data Security Issues

Data destruction, data erasure, and disk cloning all play a role in data security--and ..

4 min read

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules

Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..

Frequently Asked Questions

Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.

Why is it important to protect data on Unmanned Vehicles?

Unmanned vehicles collect, process, and warehouse significant data. This data can include mission information, data gathered during the mission, algorithms and other proprietary information enabling the vehicle. Unmanned vehicles are operating in uncontrolled environments where they risk being compromised through accidental loss or intentional actions. Even in the event of a physical accident any sensitive data is likely still accessible. To ensure the integrity of data on the vehicle it is imperative that robust protections are in place.

Why do I need hardware encryptions vs relying on software encryption?

Protecting sensitive data from advanced threat actors requires layers of protection. Software encryption provides a basic level of protection but can be defeated using a variety of techniques and technologies. This is why the NSA, DISA, NIAP and other leading experts require full drive hardware encryption to meet standards including CSfC for data at rest and FIPS 140-2. Ideally organizations use a combination of software and hardware encryption with pre boot authentication and multifactor authentication providing layers of protection that can defeat the most sophisticated threat actors.

What types of storage does Cigent offer for Unmanned Vehicle?

Cigent provides multiple secure storage to support Unmanned Vehicle operations. These include M.2 2230 SSD that provides full drive hardware encryption, the ability to create up to eight separate hidden partitions, and patented verified data erasure. Additionally, Cigent offers SSD BGA with full drive hardware encryption, the ability to create hidden partitions, and remote and policy data erasure. Both of these drives have Automotive temperature ratings. Additionally, Cigent provides the flexibility and security of hardware encryption on SD and MicroSD cards. These also include the ability to create hidden partitions and data erasure and have Industrial temperature ratings.

Has the Cigent solutions been validated by external organizations?

Yes, Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).

Still have questions?

Learn more about Cigent and our solutions by downloading our company overview.

Card

Cigent’s Federal Data Protection Solutions are second to none

Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.