Organizations we support
Military
Defense Community
Sensitive and Classified Materials at the Edge
dib-star
Defense Industrial Base
Safeguard Sensitive and Classified Data at the Edge
Intel (2)
Intelligence and Special Ops Community
Secret Data in Extreme Environments
FedCiv-2
Federal Civilian Solutions
Protection of Sensitive Data from Lost Device and Remote Attacks
Devices we protect
Frame 84
Servers / Enterprise
Frame 85
External Media
Industrial Control Systems
Industrial Control Systems
Frame 87(1)
Unmanned Vehicles
Portfolio
Products
Who we partner with
Handshake
Partnership
Cigent Ecosystem of Device and Service Partners
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Blog
Read articles on all things cyber security.
Learn More About Cigent
News from Cigent
4 min read
Edge computing demands robust security to protect ..
4 min read
Data destruction, data erasure, and disk cloning ..
Menu Close
Image landscape (4)
Intelligence and Special Operations Communities

Exceptional Mission-Critical Data Security

Adopt integrated security solutions to meet mission security needs to combat even the most advanced cybersecurity threats

The Experts in Protecting Data at the Edge

Data on endpoints is vulnerable. Whether from sophisticated remote actors or direct physical attacks, current endpoint security is insufficient to ensure data cannot be compromised by persistent threat actors. Cigent’s patented technologies provide unparalleled endpoint data protection. Recognizing your mission may require unique requirements Cigent has significant experience developing custom solutions to meet your specific needs.

Screenshot 2024-09-05 045049

Developed and Vetted by the Best

Developed by the world’s leading experts in data exfiltration and recovery, with decades of operational experience, Cigent provides unparalleled technology and expertise protecting classified and sensitive data from all known threats under any operational scenario. Cigent's solution has been tested and vetted by dozens of experts across Federal and Commercial organizations.

Screenshot 2024-09-05 045240

Protection Against the Most Advanced Threat Vectors

Well-funded nation state actors who gain physical access to a device will compromise standard protection. Advanced exfiltration techniques include reverse engineering, firmware tampering, quantum compute attacks, and utilizing electron microscopes to extract data from the chip. Cigent’s COTS solution is the only solution that ensures data is protected against these and all other techniques, tactics, and procedures (TTPs).

Screenshot 2024-09-05 045344
Layout 1
Why Cigent?

Partners to Achieve your Mission Requirements.

Cigent arose from the Intelligence Community with unequal expertise in data recovery and sanitization. With 9 patents and 6 in review, Cigent has the expertise and technical capabilities to support your specific mission requirements.
Agent-proof Usability Without Compromising Protection
With decades of experience providing data security solutions to field personnel, Cigent recognizes security that undermines a user's ability to execute their mission is useless. Cigent solutions deliver unparalleled protections and deliver a simple user experience that is intuitive to even non-technical personnel.
Drive and Data Access and Usage Visibility
Go beyond simply protecting your data and know what has happened with your drive when it wasn’t in your presence. Whether you intentionally or unintentionally left it somewhere unattended (such as the “super secure” hotel room safe) or you gave your drive to a “friend”, know when your device has been moved, accessed, tampered with, attempted to be cloned/wiped/accessed or altered.
Emergency Erasure Verified at the Individual Block Level
As confident as we are in our security, there is no greater assurance that your data is safe than simply ensuring it is no longer there at all. We implore a variety of approaches, often automated, to wipe your data when you need it gone in a hurry, and not before. And we verify that the data is truly completely gone using advanced, patented firmware based verification of every single block on the drive.
Storage Options for Every Device
From everyday PCs to external media to server storage, USB sticks and SD cards and Micro SD cards, and even embedded storage for any device, we have the storage to meet your unique mission requirements.
Custom Development
With a team of experts knowledgeable in multiple coding languages developing scriptable, automated, and/or graphical user interface applications, we can develop a solution specific to your mission requirements, integrating with other applications or simply developing APIs for you to leverage from your own tools.
Screenshot 2024-09-05 045448
BENEFITS

Not Just Data Security and Customized Capabilities, but a True Partnership

An extension to your team, we are people who get your needs and situations and will provide true accretive operational value above and beyond protecting your people and your data.

Expertise

Expertise

The Cigent team includes leading experts in data recovery and sanitization with decades of practical experience and a commitment to support US agencies.

Ecosystem

Ecosystem

Cigent has been validated by and works with all leading CSfC for SIs providing integrated solutions including District Defend and Secure View

Portfolio

Portfolio Breadth

Cigent offer broadest range of Secure storage coverage including PCs, Servers, Laptops External, Media, and Embedded for IOT, OT, and vehicles.

Ease of Engagement

Ease of Engagement

Streamline procurement exercise by sourcing devices or secured storage directly from manufacturers including Dell, HP, GETAC and others

Resources / Blog
Introduce resources that can
provide value to the visitor
4 min read

Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge

Edge computing demands robust security to protect sensitive data from unauthorized ..

4 min read

Disk Cloning and Data Destruction to Prevent Data Security Issues

Data destruction, data erasure, and disk cloning all play a role in data security--and ..

4 min read

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules

Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..

Frequently Asked Questions

Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.

What does Cigent do?

Cigent protects data on devices operating at the edge from unauthorized access. Cigent solutions secures data at rest with layered protection including hardware encryption, pre-boot authentication, and multifactor authentication. Cigent also ensures data integrity when the device is in use preventing wiping and cloning and other data attacks. Secure Storage includes patented capabilities that verify data erasure to provide end-to-end lifecycle protection.

How does Cigent work?

To prevent sophisticated adversaries from unauthorized access requires layered protection. The foundation of Cigent solution is 256-AES full drive hardware encryption with pre-boot and multifactor authentication. These capabilities have been validated by agencies including NSA and NIAP. Additionally, Cigent provides capabilities that ensure the integrity of data through its lifecycle including hidden partitions, storage-embedded AI, and verified data erasure.

What agencies does Cigent support?

Cigent secure storage solutions have been validated by NSA and DISA and has experience working across the Intelligence Community.

Have Cigent Secure Storage been tested and validated?

Yes, Cigent secure storage have been tested, vetted and deployed by US Federal Agencies and with key Defense Contractors and Integrators. Federal agencies include MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK). Additionally leading CSfC integrators, including Booz Allen Hamilton District Defend, AFRL’s SecureView, Everfox Trusted Thin Client, Integrated Global Security, Army APG, and CACI ID Tec’s Archon utilize Cigent Secure Storage.

Can Cigent support custom projects?

Yes, Cigent has extensive experience with custom projects for unique mission requirements. Leveraging their decades of experience with the Intelligence Community and their extensive portfolio of proven technologies, Cigent can develop customized systems. The team has multiple personnel with security clearance to facilitate communications and ensure specific needs are addressed.

What devices does Cigent protect?

Cigent provides the widest breadth of secure storage solutions all utilizing hardware encryption. These include: PCs supporting both M.2 2280 and the emerging M.2 2230 standard, remote servers and NAS devices with U.2 drives, external media with flash drives, encrypted external drives, SD and Micro SD cards, and embedded for SSD BGA.

Does Cigent offer solutions that provide protection hidden in plain sight?

A key characteristic of Cigent secure storage is that the portfolio appears to be standard drives and devices. For example, Cigent External Storage Delta device looks identical to a standard drive yet includes Cigent full drive hardware encryption, portfolio of software capabilities including storage embedded AI, and advanced physical detection including accelerometers and disconnect detection circuit. An adversary would not realize the extent of these protections.

Still have questions?

Learn more about Cigent and our solutions by downloading our company overview.

Card

Cigent’s Federal Data Protection Solutions are second to none

Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.