Effectively, Efficiently Meet FIPS Compliance
Protect data at rest and meet FIPS compliance with validated full drive hardware encryption.
The Federal Information Processing Standard (FIPS) 140-2, defined by NIST, is a set of standards that define the security requirements for cryptographic modules used to protect sensitive information. Cigent portfolio of Secure Storage provides organization with a secure, proven, and efficient solution to meet FIPs 140-2 Level 3 requirements.
Full drive encryption
Cigent’s solution uses proven, and NSA validated encryption methodology, including full drive AES-256-bit hardware encryption. Organizations seeking to elevate their security can utilize pre-boot authentication and multi-factor authentication with the same solution.
Enterprise Administration
Cigent provide scalable management of its Secure Storage Solutions including enterprise management console that can be deployed on premise and in the cloud. Additionally, Cigent offers a Command Line Interface (CLI) for Linux and Windows devices.
Robust Ecosystem
Cigent is working with all major CSfC integrators including AFRL, Booz Allen, CACI, and Exerfox to enable your mission requirements. With successful deployments including SecureView and Data Defense the Cigent solution is tested and trusted by leading security experts.
Easy to Acquire
Cigent seeks to streamline your procurement process with Cigent Secure Storage available directly from major device manufacturers including Dell, HP, and GETAC.
Advanced Data Capabilities
Cigent complements full drive hardware encryption with advanced protection features preventing advanced adversaries and providing security throughout the data's lifecycle
Cigent Secure Storage provides the option to create hidden partition generating enclaves to store sensitive data preventing an adversary from discovering even the existence of the data. The hidden partitions are unreadable at the sector level even after logging onto the device until unlocked using step-up authentication.
Cigent Secure Storage Solutions prevent cloning with hidden partitions that create secure enclaves where data cannot be illicitly accessed. The hidden partitions lock all data ranges preventing an adversary from gaining unauthorized access. Valid users utilize step-up authentication to access files maintaining data protection even when device is actively in use.
Cigent Secure Storage provides the capability to initiate data erasure command locally or remotely with a combination of crypto and full block wipe. Additionally, with Verified Data Erasure they can perform block-by-block analysis to ensure that all data has been permanently erased. This patnted solution provides confidence in emergency data destruction situations, addresses risk from emerging quantum capabilities, and provides potential for drive reuse.
Cigent Secure Storage Solutions collect and securely store all data-related activity. These logs provide irrefutable, tamper-proof documentation of data-related activity preventing a malicious actor from “covering their track.” Log activity can be reviewed to detect malicious activity and used for incident response.
The Cigent Advantage
Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).
To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.
infographic
Meet FIPS 140-2 Standards
Cigent provides unparalleled technology, ecosystem, and expertise to ensure your sensitive data is protected no matter what your mission. The Cigent solution was developed for and with US Federal agencies by leading experts in data recovery and sanitization.
provide value to the visitor
Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge
Edge computing demands robust security to protect sensitive data from unauthorized ..
Disk Cloning and Data Destruction to Prevent Data Security Issues
Data destruction, data erasure, and disk cloning all play a role in data security--and ..
FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules
Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..
Frequently Asked Questions
Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.
Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.
Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.
Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.
Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.
Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.
Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.
Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.
Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.
Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.
Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.
Cigent’s Federal Data Protection Solutions are second to none
Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.