Organizations we support
Military
Defense Community
Sensitive and Classified Materials at the Edge
dib-star
Defense Industrial Base
Safeguard Sensitive and Classified Data at the Edge
Intel (2)
Intelligence and Special Ops Community
Secret Data in Extreme Environments
FedCiv-2
Federal Civilian Solutions
Protection of Sensitive Data from Lost Device and Remote Attacks
Devices we protect
Frame 84
Servers / Enterprise
Frame 85
External Media
Industrial Control Systems
Industrial Control Systems
Frame 87(1)
Unmanned Vehicles
Portfolio
Products
Who we partner with
Handshake
Partnership
Cigent Ecosystem of Device and Service Partners
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Blog
Read articles on all things cyber security.
Learn More About Cigent
News from Cigent
4 min read
Edge computing demands robust security to protect ..
4 min read
Data destruction, data erasure, and disk cloning ..
Menu Close
iStock-2120816452

Protecting Data on the Edge from Remote Attacks

Detect and respond paradigm is insufficient to prevent data compromises on endpoints. Cigent delivers proactive data protection for vulnerable endpoints that stops data attacks.

Threat Vectors

Protection from all Threat Vectors

Cigent approach of protecting the data itself provides pervasive protection against different approaches. The fail-safe protection acts as a final line-of-defense that maintains data integrity when other protections have been defeated.

Minimal Impact to End Users

Minimal Impact to End Users

Cigent provides security for the modern workforce delivering robust protection without disrupting end users. Granular policy controls balance risk posture to user experience.

Efficient Administration

No Administrative Overhead

Endpoint protection relies upon detect and respond paradigm generating significant burden for security and IT teams. Cigent delivers proactive protection with data always protected with set-and-forget capabilities.

Prevent Data Attack

Protects Data when Device is Compromised

Zero trust access control with step-up authentication prevents unauthorized access even if device has been compromised by ransomware of other data attacks.

Layout 1 (1)
Advanced Data Capabilities

Proactive Protection for Endpoint Data Security

Zero-trust Access Control

Endpoint data remains in a protected state until users accesses with step-up authentication.

Trust, but Verify

Policy-driven step-up-authentication access control –files remain protected from unauthorized access. Efficient authentication and AI optimization minimizes user friction.

Granular Policy Control

Policy-based settings assigned based on user persona including file type, location, and risk tolerance.

Always-on or Risk-based Policy Enforcement

Based on risk-profile policy access controls implemented when a threat is detected, when user access thresholds have been reached and environment.

Screenshot 2024-09-05 051738

Instant Protection

Cigent works with your EDR and security solution to instantly protect data upon threat detection.

Elevated threats, elevated protections.

Cigent proactively increases data protection with identification of threats by EDR.

Integration with EDR, SIEM, and SOC

Integration with major vendors aligns data risk with risks levels.

Instant Lock

Continual communications with EDR results in instant-lock if attackers render EDR inoperable.

Screenshot 2024-09-05 051738

Hidden Partitions

Create hidden partitions for securing critical data.

Secure Enclaves

Data is unreadable at the sector level even after logging on until unlocked using step-up authentication.

Clone and Wipe Protection

Partitions are locked preventing coning and wiping attacks.

Simple Administration

Easily create and manage multiple partitions with enterprise management or user interface.

Screenshot 2024-09-05 051738

AI Data Monitoring

Storage embedded AI continually monitors data access patterns.

Instant Protection

Upon detection of anomalous behavior can instantly lock data preventing unauthorized access.

Tamper Proof

AI is embedded within storage preventing actors from compromising AI.

Stop Alt OS/Boot

AI will detect sophisticated actor utilizing alternative OS/Boot and instantly secure all data.

Screenshot 2024-09-05 051738
DEVICES

Devices Protected

Cigent provides the broadest range of offerings including coverage for PCs
with 2280 and a 2230 drives and Enterprise Storage.

PCs

Secure Storage 2280 SSD:

2280 is the legacy standard for storage configuration on PCs

Secure Storage 2230 SSD

2230 is an emerging standard for device manufactures storage configurations including Microsoft Surface, Dell Latitude, and HP EliteBooks

Cigent is the only provider of secure storage 2230 with PBA that has been approved by the NSA

Enterprise Storage

Secure Enterprise Storage CSfC

Cigent provides exclusive capabilities to protect servers operating on the edge. Provides full drive hardware encryption, PBA with MFA, and advanced capabilities including verified data erasure.

Secure Boot 2280 SSD Bravo

A boot drive is a storage device that contains the files needed to start a computer's operating system (OS) or firmware when it is turned on or restarted.  Cigent ensures these critical drives are protected with features including full drive hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, verified data erasure, and command logs.

TAGLINE

The Cigent Advantage

Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).

To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.

AdobeStock_199768165
Resources / Blog
Introduce resources that can
provide value to the visitor
4 min read

Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge

Edge computing demands robust security to protect sensitive data from unauthorized ..

4 min read

Disk Cloning and Data Destruction to Prevent Data Security Issues

Data destruction, data erasure, and disk cloning all play a role in data security--and ..

4 min read

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules

Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..

Frequently Asked Questions

Frequently asked questions ordered by popularity. Remember that if the visitor has not committed to the call to action, they may still have questions (doubts) that can be answered.

Still have questions?

Learn more about Cigent and our solutions by downloading our company overview.

Card

Cigent’s Federal Data Protection Solutions are second to none

Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.