Organizations we support
Military
Defense Community
Sensitive and Classified Materials at the Edge
dib-star
Defense Industrial Base
Safeguard Sensitive and Classified Data at the Edge
Intel (2)
Intelligence and Special Ops Community
Secret Data in Extreme Environments
FedCiv-2
Federal Civilian Solutions
Protection of Sensitive Data from Lost Device and Remote Attacks
Devices we protect
Frame 84
Servers / Enterprise
Frame 85
External Media
Industrial Control Systems
Industrial Control Systems
Frame 87(1)
Unmanned Vehicles
Portfolio
Products
Who we partner with
Handshake
Partnership
Cigent Ecosystem of Device and Service Partners
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Blog
Read articles on all things cyber security.
Learn More About Cigent
News from Cigent
4 min read
Edge computing demands robust security to protect ..
4 min read
Data destruction, data erasure, and disk cloning ..
Menu Close
Image landscape (5)

Cigent Enables Compliance Requirements

Validated full drive hardware encryption, PBA, and MFA

Federal agencies and contractors are required to meet standards to ensure sensitive or confidential data. With a growing number of devices operating at the edge collecting, processing, and storing sensitive data it is imperative that data on these devices is secured. NSA, DISA, NIST and other Federal organizations have defined guidelines for protecting data at rest on these devices. Cigent Secure Storage Solutions protect data on devices at the edge and enable organizations to meet compliance requirements.
4 National Security Agency

CSfC for DAR

NSA established the Commercial Solutions for Classified (CSfC) program setting minimum requirements to protect classified data at rest (DAR) on endpoints. The NSA mandates a layered approach requiring a combination of hardware encryption and pre-boot authentication (PBA).

NSA publishes a component list of organizations who meet NSA CSfC for DAR requirements.

Cigent is on the CSfC for DAR component list providing full drive hardware encryption and pre-boot authentication solutions.

3 FIPS Validated

FIPs 140-2 Level 3

The National Institute of Standards and Technology (NIST) validates cryptographic modules. A product with a FIPS 140-2 certificate means that it has been tested with formal validation of the cryptographic module.

FIPS 140-2 certification are required for all devices containing sensitive data. This includes the majority of devices in Departments of Defense, State, Homeland, Justice, and other Departments and Agencies dealing with sensitive data.

Cigent Secure Storage provides FIPS 140-2 Level 3 certified drives with full drive hardware encryption and pre-boot authentication.

Untitled design (8)

Executive Order 14028

EO 14028 “Improving the Nation’s Cybersecurity,” issued May 12, 2021, mandates the adoption of multifactor authentication (MFA) and encryption for endpoint devices. It also advocates the utilization of zero-trust architecture.

Cigent Secure Storage provides full drive hardware encryption with MFA meeting EO14028 requirements. Additionally, Cigent is unique in creating zero-trust endpoint architecture through hidden partitions and step-up authentication to prevent unauthorized data access.

5 NIAP

NIAP

NIAP certification, or National Information Assurance Partnership certification, is a commercial cybersecurity product certification that ensures commercial IT products used in National Security Systems meet common criteria. NIAP certification is required by federal procurement requirements and is relevant to the Department of Defense, the Intelligence Community, and any DoD contractors or affiliates.

Cigent Secure Storage has been tested and validated NIAP providing DAR security.

The Cigent Advantage

Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).

To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.

iStock-814367282

infographic

Visualize CSfC for DAR

Infographic-Protect-Your-Data-with-CSfC-for-DAR-by-Cigent-11-19-2024_09_50_AM
Resources / Blog
Introduce resources that can
provide value to the visitor
4 min read

Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge

Edge computing demands robust security to protect sensitive data from unauthorized ..

4 min read

Disk Cloning and Data Destruction to Prevent Data Security Issues

Data destruction, data erasure, and disk cloning all play a role in data security--and ..

4 min read

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules

Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..

Frequently Asked Questions

Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.

What does Cigent do?

Cigent protects data on devices operating at the edge from unauthorized access. Cigent solutions secures data at rest with layered protection including hardware encryption, pre-boot authentication, and multifactor authentication. Cigent also ensures data integrity when the device is in use preventing wiping and cloning and other data attacks.

What is Advanced Data Recovery?

Advanced data recovery (ADR) includes a variety of techniques and technology that can be utilized to recover data from a device. ADR is not necessarily malicious as it can be utilized for the legitimate recovery of data when a device may have been physically damaged, data was inadvertently erased, or other incidents. However, actors will use ADR to circumvent protections for the secure storage of data.

How does Cigent prevent malicious Advanced Data Recovery?

Cigent employs layers of security to prohibit unauthorized data access. The foundation of Cigent protection is the combination of AES 256 full drive hardware encryption coupled with pre-boot authentication (PBA), and multifactor authentication (MFA). This combination of technologies delivers high-confidence protection for data at rest. In addition, Cigent has advanced, patented features that provide additional security and extends data protection throughout its lifecycle. These include hidden partitions with locked data ranges, storage embedded AI monitoring data access patterns, secure data logs documenting all data activity, and verified data erasure.

Does Cigent use Artificial Intelligence to prevent Advanced Data Recovery?

Cigent data at rest protection foundation is full drive hardware encryption. Cigent complements this with patented storage embedded AI that monitors data access patterns. AI embedded within the storage continually monitors data access patterns instantly securing data when anomalous behavior is detected. This includes detection if an adversary attempts an alternate O/S boot approach. The AI capabilities provide an additional tamper-proof monitoring that extends Cigent protection for ADR.

Still have questions?

Learn more about Cigent and our solutions by downloading our company overview.

Card

Cigent’s Federal Data Protection Solutions are second to none

Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.