Effective protection is contingent on deployment and administration of the solution. Cigent provides multiple options for management of secure storage at scale. Cigent provides an enterprise management console that can be deployed in the cloud or on premises.
Enterprise Management Console
Enterprise management console that can be deployed in the cloud or on premises
Command Line Interface
Command Line Interface (CLI) tool that runs in Linux and Windows.
Robust Administration
Administration tools include key management, compliance reporting,policy setting and incident response.
Recover & Destroy Data
PBA keeps secure, comprehensive log including Logout, Useradd/edit/delete, Log purge and Platform update.
Capabilities
Enterprise Management Features
Configuration
Install/Uninstall/Enable/Disable platform
Drive Erasure
User Configuration
Platform configuration
Monitoring
Installation Status
Users
Current Settings
Activity Log
Reporting
Custom reports with time, device, user specific filtering
Automated report generation
TAGLINE
Cigent Advantages
Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).
To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.
provide value to the visitor
Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge
Edge computing demands robust security to protect sensitive data from unauthorized ..
Disk Cloning and Data Destruction to Prevent Data Security Issues
Data destruction, data erasure, and disk cloning all play a role in data security--and ..
FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules
Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..
Frequently Asked Questions
Frequently asked questions ordered by popularity. Remember that if the visitor has not committed to the call to action, they may still have questions (doubts) that can be answered.
Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.
Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.
Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.
Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.
Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.
Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.
Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.
Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.
Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.
Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.
Still have questions?
Support details to capture customers that might be on the fence.
Cigent’s Federal Data Protection Solutions are second to none
Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.