Safeguard Sensitive and Classified Data at the Edge
Secure storage solutions tailored for defense community teams
Intro
Single Solution to Protect Data at the Edge
Teams engaged with the defense community must ensure that devices involved in collecting, processing, or storing sensitive data are well-protected to comply with regulations and ensure data integrity. Cigent delivers secure storage solutions that blend hardware and software capabilities to meet compliance requirements effectively. Our patented features prevent unauthorized access, counter advanced data recovery attempts, mitigate insider threats, and simplify data sanitization processes.
Meet Compliance
Our extensive portfolio is validated by leading agencies like NSA, NIAP, NIST, and CSfC for DAR
Data at Rest Encryption
Utilizing military-grade, full-drive AES 256-bit hardware encryption technology with pre-boot authentication.
Advanced Data Protection
Offers scalable or device-specific deployment management options with modern management tools, either on-premises, in-cloud, or via Command Line Interface (CLI).
Efficient Administration
At scale or device specific administration of protection capabilities. Cloud or on-premise management console or Command Line Interface.
Device Coverage
Data Protection for all of your Devices
BENEFITS
What makes Cigent unique
Encryption and PBA provide foundational data security, but evolving sophisticated adversaries present additional risk. Cigent provides portfolio of cyber security features to mitigate risk. These include:
Expertise
Our team includes leading experts in data recovery and sanitization with decades of practical experience and a commitment to supporting US agencies.
Ecosystem
Cigent has been validated by and collaborates with all leading CSfC for SIs, providing integrated solutions like District Defend and Secure View.
Portfolio Breadth
We offer the broadest range of secure storage solutions, including PCs, Servers, Laptops, External Media, and Embedded devices for IoT, OT, and vehicles.
Ease of Engagement
Simplify procurement by sourcing devices or secured storage directly from manufacturers such as Dell, HP, GETAC, and others.
provide value to the visitor
Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge
Edge computing demands robust security to protect sensitive data from unauthorized ..
Disk Cloning and Data Destruction to Prevent Data Security Issues
Data destruction, data erasure, and disk cloning all play a role in data security--and ..
FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules
Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..
Frequently Asked Questions
Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don't see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.
Cigent protects data on devices operating at the edge from unauthorized access. Cigent solutions secures data at rest with layered protection including hardware encryption, pre-boot authentication, and multifactor authentication. Cigent also ensures data integrity when the device is in use preventing wiping and cloning and other data attacks. Secure Storage includes patented capabilities that verify data erasure to provide end-to-end lifecycle protection.
To prevent sophisticated adversaries from unauthorized access requires layered protection. The foundation of Cigent solution is 256-AES full drive hardware encryption with pre-boot and multifactor authentication. These capabilities have been validated by agencies including NSA and NIAP. Additionally, Cigent provides capabilities that ensure the integrity of data through its lifecycle including hidden partitions, storage-embedded AI, and verified data erasure.
Cigent secure storage solutions have been validated by NSA and DISA and can be used across United States Department of Defense, Defense Contractors, and other Federal agencies with sensitive and classified data.
Yes, Cigent secure storage have been tested, vetted and deployed by US Federal Agencies and with key Defense Contractors and Integrators. Federal agencies include MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK). Additionally leading CSfC integrators, including Booz Allen Hamilton District Defend, AFRL’s SecureView, Everfox Trusted Thin Client, Integrated Global Security, Army APG, and CACI ID Tec’s Archon utilize Cigent Secure Storage.
Data at rest encryption traditionally refers to the encryption of data when the device is asleep or powered-off. Data at rest encryption seeks to prevent adversaries who gain physical access to the device would seek to extract sensitive data. Cigent uses AES 256 full drive hardware encryption with pre-boot and multifactor authentication. In addition, Cigent uses zero-trust access to control to also protect data when a device is in use. This is with hidden partitions that maintain encryption until it is accessed with step-up authentication.
Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.
Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.
Cigent provides the widest breadth of secure storage solutions all utilizing hardware encryption. These include: PCs supporting both M.2 2280 and the emerging M.2 2230 standard, remote servers and NAS devices with U.2 drives, external media with flash drives, encrypted external drives, SD and Micro SD cards, and embedded for SSD BGA.
Yes, Cigent Secure Storage Solutions can support organizations meeting Commercial Solutions for Classified (CSfC) for data at rest including pre-boot authentication requirements. Cigent solutions can also meet FIPS 140-2 and 140-3 standards. Additionally, Cigent can address requirements from Executive Order 14028 including encryption of data at rest, multi-factor authentication, and the utilization of zero-trust access control.
Still have questions?
Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.
Cigent’s Federal Data Protection Solutions are second to none
Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.