Protect Endpoint Data in Federal Civilian Agencies
FIPS 140-2 Data Encryption with Multifactor Authentication
Intro
Layered Data Protection
Endpoints continue to be a source of vulnerability with devices going missing or being infected leading to data compromise. Cigent provides a single solution enabling organization to meet FIPS data at rest standards, address EO 14028 multifactor authentication requirements, and defeat remote attacks including ransomware.
Cigent is unique providing integrated hardware and software protection for a variety of devices operating at the edge including PCs, Servers, External Storage, and Unmanned Vehicles.
Meet Compliance
Extensive validation of portfolio by NSA, NIAP, NIST and other leading agencies including FIPS 130-2 and CSfC for DAR certification.
Data at Rest Encryption
NSA and NIAP validated full-drive AES 256-bit hardware encryption technology with pre boot authentication and multifactor authentication.
Multifactor Authentication
Cigent delivers multi-factor authentication capabilities addressing EO14028 requirements. Cigent provides the option for both pre and post-boot authentication.
Prevent Data Attacks
Stop ransomware and other remote data attacks with step-up authentication preventing data encryption, exfiltration, tampering or wiping.
Advanced Data Protection
Cigent layered protections prevent advanced data recovery techniques when an adversary has gained access to the device.
Enterprise Management
Cigent provides an enterprise management console available in the cloud and on premise and a command line interface available on Windows and Linux. Capabilities include key management, compliance reporting, deployment automation and others.
Device Coverage
Breadth of Device Coverage
BENEFITS
What makes Cigent unique
Encryption and PBA provide foundational data security, but evolving sophisticated adversaries present additional risk. Cigent provides portfolio of cyber security features to mitigate risk. These include:
Expertise
The Cigent team includes leading experts in data recovery and sanitization with decades of practical experience and a commitment to support US agencies.
Ecosystem
Cigent has been validated by and works with all leading CSfC for SIs providing integrated solutions including District Defend and Secure View
Portfolio Breadth
Cigent offer broadest range of Secure storage coverage including PCs, Servers, Laptops External, Media, and Embedded for IOT, OT, and vehicles.
Ease of Engagement
Streamline procurement exercise by sourcing devices or secured storage directly from manufacturers including Dell, HP, GETAC and others
ebook
Enhance Your Device Security
Cigent Data Defense provides advanced security controls to protect, hide, and destroy sensitive data on workstations, PCs, mobile systems and removable data stores.
provide value to the visitor
Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge
Edge computing demands robust security to protect sensitive data from unauthorized ..
Disk Cloning and Data Destruction to Prevent Data Security Issues
Data destruction, data erasure, and disk cloning all play a role in data security--and ..
FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules
Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..
Frequently Asked Questions
Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.
Cigent protects data on devices operating at the edge from unauthorized access. Cigent solutions secures data at rest with layered protection including hardware encryption, pre-boot authentication, and multifactor authentication. Cigent also ensures data integrity when the device is in use preventing wiping and cloning and other data attacks. Secure Storage includes patented capabilities that verify data erasure to provide end-to-end lifecycle protection.
To prevent sophisticated adversaries from unauthorized access requires layered protection. The foundation of Cigent solution is 256-AES full drive hardware encryption with pre-boot and multifactor authentication. These capabilities have been validated by agencies including NSA and NIAP. Additionally, Cigent provides capabilities that ensure the integrity of data through its lifecycle including hidden partitions, storage-embedded AI, and verified data erasure.
Cigent secure storage solutions have been validated by NSA, NIST, NIAP, DISA and can be used across Federal civilian agencies with sensitive and classified data.
Yes, Cigent secure storage have been tested, vetted and deployed by US Federal Agencies and with key Defense Contractors and Integrators. Federal agencies include MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK). Additionally leading CSfC integrators, including Booz Allen Hamilton District Defend, AFRL’s SecureView, Everfox Trusted Thin Client, Integrated Global Security, Army APG, and CACI ID Tec’s Archon utilize Cigent Secure Storage.
Data at rest encryption traditionally refers to the encryption of data when the device is asleep or powered-off. Data at rest encryption seeks to prevent adversaries who gain physical access to the device would seek to extract sensitive data. Cigent uses AES 256 full drive hardware encryption with pre-boot and multifactor authentication. In addition, Cigent uses zero-trust access to control to also protect data when a device is in use. This is with hidden partitions that maintain encryption until it is accessed with step-up authentication.
Cigent provides the widest breadth of secure storage solutions all utilizing hardware encryption. These include: PCs supporting both M.2 2280 and the emerging M.2 2230 standard, remote servers and NAS devices with U.2 drives, external media with flash drives, encrypted external drives, SD and Micro SD cards, and embedded for SSD BGA.
Protecting sensitive data from advanced threat actors requires layers of protection. Software encryption provides a basic level of protection but can be defeated using a variety of techniques and technologies. This is why the NSA, DISA, NIAP and other leading experts require full drive hardware encryption to meet standards including CSfC for data at rest and FIPS 140-2. Ideally organizations use a combination of software and hardware encryption with pre boot authentication and multifactor authentication providing layers of protection that can defeat the most sophisticated threat actors.
Yes, Cigent Secure Storage Solutions can support organizations meeting Commercial Solutions for Classified (CSfC) for data at rest including pre-boot authentication requirements. Cigent solutions can also meet FIPS 140-2 and 140-3 standards. Additionally, Cigent can address requirements from Executive Order 14028 including encryption of data at rest, multi-factor authentication, and the utilization of zero-trust access control.
Still have questions?
Learn more about Cigent and our solutions by downloading our company overview.
Cigent’s Federal Data Protection Solutions are second to none
Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.