BOOK A DEMO
Organizations
Organizations we support
Defense Community
Sensitive and Classified Materials at the Edge
Learn More
Intelligence and Special Ops Community
Secret Data in Extreme Environments
Learn More
Federal Civilian Solutions
Protection of Sensitive Data from Lost Device and Remote Attacks
Learn More
How We Help
How We Help
Meet Compliance
Meet CSfC for DAR Сompliance
Meet FIPS 140-2 Сompliance
Meet Compliance
Capabilities
Full Drive Hardware Encryption
Multifactor Authentication
Verified Data Erasure
Features
Use Cases
Protection for Advanced Data Recovery
Protecting for Remote Data Attacks
Custom Data Protection Solution
Devices
Devices we protect
PCs
Learn More
Servers / Enterprise
Learn More
External Media
Learn More
Industrial Control Systems
Learn More
Unmanned Vehicles
Learn More
Products
Learn More
Partners
Who we partner with
Partnership
Cigent Ecosystem of Device and Service Partners
Learn More
Assets
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Access now
Blog
Read articles on all things cyber security.
Learn More
Company
Learn More About Cigent
Cigent Commercial Solutions
Company Overview
Investors
Careers
Customer Support
News from Cigent
4 min read
Edge Computing Requires Edge ..
Edge computing demands robust security to protect ..
4 min read
Disk Cloning and Data Destruction ..
Data destruction, data erasure, and disk cloning ..
See all articles
Contact
Menu
Close
BOOK A DEMO
Blog
Blog
Stay updated with the latest insights from our blog.
All
All
Blog
In the News
Blog
September 9 2024
Data Security for Unmanned Vehicles—both UAV and UGV
Read more
Primary Filter
ALL
Products
Capabilities
Solutions
Secondary Filter
ALL
blog
in-the-news
Blog
•
September 9 2024
Data Security for Unmanned Vehicles—both UAV and UGV
"No Data found. Refine your selection...."