Organizations we support
Military
Defense Community
Sensitive and Classified Materials at the Edge
dib-star
Defense Industrial Base
Safeguard Sensitive and Classified Data at the Edge
Intel (2)
Intelligence and Special Ops Community
Secret Data in Extreme Environments
FedCiv-2
Federal Civilian Solutions
Protection of Sensitive Data from Lost Device and Remote Attacks
Devices we protect
Frame 84
Servers / Enterprise
Frame 85
External Media
Industrial Control Systems
Industrial Control Systems
Frame 87(1)
Unmanned Vehicles
Portfolio
Products
Who we partner with
Handshake
Partnership
Cigent Ecosystem of Device and Service Partners
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Blog
Read articles on all things cyber security.
Learn More About Cigent
News from Cigent
4 min read
Edge computing demands robust security to protect ..
4 min read
Data destruction, data erasure, and disk cloning ..
Menu Close
Hero

Effectively, Efficiently Meet FIPS Compliance

Protect data at rest and meet FIPS compliance with validated full drive hardware encryption.

The Federal Information Processing Standard (FIPS) 140-2, defined by NIST, is a set of standards that define the security requirements for cryptographic modules used to protect sensitive information. Cigent portfolio of Secure Storage provides organization with a secure, proven, and efficient solution to meet FIPs 140-2 Level 3 requirements.
Frame 93 (8)

Full drive encryption

Cigent’s solution uses proven, and NSA validated encryption methodology, including full drive AES-256-bit hardware encryption. Organizations seeking to elevate their security can utilize pre-boot authentication and multi-factor authentication with the same solution.

Efficient Administration

Enterprise Administration 

Cigent provide scalable management of its Secure Storage Solutions including enterprise management console that can be deployed on premise and in the cloud. Additionally, Cigent offers a Command Line Interface (CLI) for Linux and Windows devices.

Ecosystem

Robust Ecosystem

Cigent is working with all major CSfC integrators including AFRL, Booz Allen, CACI, and Exerfox to enable your mission requirements. With successful deployments including SecureView and Data Defense the Cigent solution is tested and trusted by leading security experts.

Easy to Aquire

Easy to Acquire

Cigent seeks to streamline your procurement process with Cigent Secure Storage available directly from major device manufacturers including Dell, HP, and GETAC.

Layout 1 (1)
Advanced Data Capabilities

Cigent complements full drive hardware encryption with advanced protection features preventing advanced adversaries and providing security throughout the data's lifecycle

Cigent Secure Storage provides the option to create hidden partition generating enclaves to store sensitive data preventing an adversary from discovering even the existence of the data. The hidden partitions are unreadable at the sector level even after logging onto the device until unlocked using step-up authentication.

Screenshot 2024-09-05 051738

Cigent Secure Storage Solutions prevent cloning with hidden partitions that create secure enclaves where data cannot be illicitly accessed. The hidden partitions lock all data ranges preventing an adversary from gaining unauthorized access. Valid users utilize step-up authentication to access files maintaining data protection even when device is actively in use.

Screenshot 2024-09-05 051738

Cigent Secure Storage provides the capability to initiate data erasure command locally or remotely with a combination of crypto and full block wipe. Additionally, with Verified Data Erasure they can perform block-by-block analysis to ensure that all data has been permanently erased. This patnted solution provides confidence in emergency data destruction situations, addresses risk from emerging quantum capabilities, and provides potential for drive reuse.

Screenshot 2024-09-05 051738

Cigent Secure Storage Solutions collect and securely store all data-related activity. These logs provide irrefutable, tamper-proof documentation of data-related activity preventing a malicious actor from “covering their track.” Log activity can be reviewed to detect malicious activity and used for incident response.

Screenshot 2024-09-05 051738

The Cigent Advantage

Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).

To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.

iStock-1427847593-1
infographic

Meet FIPS 140-2 Standards

Cigent provides unparalleled technology, ecosystem, and expertise to ensure your sensitive data is protected no matter what your mission. The Cigent solution was developed for and with US Federal agencies by leading experts in data recovery and sanitization.

Infographic-Protect-Your-Data-with-CSfC-for-DAR-by-Cigent-11-19-2024_10_05_AM
Resources / Blog
Introduce resources that can
provide value to the visitor
4 min read

Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge

Edge computing demands robust security to protect sensitive data from unauthorized ..

4 min read

Disk Cloning and Data Destruction to Prevent Data Security Issues

Data destruction, data erasure, and disk cloning all play a role in data security--and ..

4 min read

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules

Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..

Frequently Asked Questions

Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.

Question text goes here

Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.

Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.

Question text goes here

Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.

Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.

Question text goes here

Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.

Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.

Question text goes here

Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.

Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.

Question text goes here

Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.

Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.

Still have questions?

Download Company Overview

Card

Cigent’s Federal Data Protection Solutions are second to none

Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.