Secure mission data on devices operating on the edge with Cigent data protection hardware and software. Cigent provides layered CSfC for DAR protection to secure data on PCs, servers, manned and unmanned vehicles, and industrial control systems (ICS).
As the foundation of the outer protection layer in CSfC Data-at-Rest architectures, Cigent PBA pairs hardware full-drive encryption with a secure, OS-independent environment to ensure stored data remains protected, even if devices are lost, unattended, or in the field.
Cigent Software Full Drive Encryption safeguards sensitive data from power-off through system boot, aligning with the NSA CSfC DAR capability package requirements for the inner encryption layer.
Cigent SSDs deliver FIPS and CSfC-aligned protection for PCs and mobile workstations. Built for federal and defense missions, these drives combine hardware full-drive encryption and pre-boot authentication to keep sensitive data secure.
Designed for scale, and aligned with FIPS 140-3 and CSfC for Data-at-Rest (DAR) standards, Cigent SSDs for Enterprise combine hardware encryption and Pre-Boot Authentication (PBA) enforcement to protect sensitive and classified workloads across large, multi-drive environments.
Cigent SSD UxV secures mission data collected and stored on manned and unmanned vehicles, preventing unauthorized data access. UxV platforms capture and process sensitive intelligence that must remain protected even if the system is lost, recovered by adversaries, or operating far beyond secure facilities. Cigent SSDs ensure mission data stays secure when it matters most.
Industrial Control Systems (ICS) capabilities are advancing rapidly, optimizing efficiency and reducing or eliminating manual tasks. Subsequently, ICS are collecting, processing, and warehousing increasing volumes of data that may be sensitive and or classified and need to be protected. Combining strong hardware encryption with Pre-Boot Authentication and secure partitioning, Cigent drives safeguard operational data, configurations, and logs without compromising uptime or system performance.