
Layered Data Protection
Cigent solutions provide layer protection for data at rest. Additional capabilities extend protection to when a device is in-use, mitigates insider threats, and sanitizes data.
Cigent’s complete list of capabilities are listed below.

Value | Description | |
---|---|---|
CSfC Required Capabilities | ||
Hardware Full Drive Encryption | Data at rest protection | Full-drive AES 256-bit hardware full -drive encryption validated by NIAP with multiple drives listed on NSA CSfC for DAR component list. With PBA provides an outer layer of CSfC for DAR compliance requirements. |
Pre-boot Authentication | Prevents adversary from compromising OS boot | PBA provides a separate, secure authentication prior to initiating boot. Validated by NIAP and listed on NSA CSfC for DAR component list. With hardware FDE provides an outer layer of CSfC for DAR compliance requirements. |
Software Full Drive Encryption | Data at rest protection | Full-drive AES 256-bit software full -drive encryption validated by NIAP. Undergoing CSfC certification. With MFA provides an inner layer of CSfC for DAR compliance requirements. |
Multifactor Authentication | Mitigates threat from credential compromise | MFA supports software FDE requiring multiple authentication factors. Requires use of both U/N Password and smart card (CAC) or security key. With software FDE provides an inner layer of CSfC for DAR compliance requirements. |
Advanced Protection | ||
Enterprise Management | Streamline administration | Cigent Command Line Interface (CLI) seamlessly integrates within existing management. |
Verified Data Erasure | Data sanitization | Cigent employs crypto and block data erasure executed locally, remotely, or with rules-based policy. Additional patented firmware-based verification ensures all data has been successfully destroyed. |
Secure Partitions | Clone and wipe prevention | Quantum and insider threat mitigation | Ability to create separate locked partitions where data is locked and unreadable at the sector level. Adversaries cannot detect drives even with direct device access. Can create up to eight drives to segment data and limit user access. |
Zero-trust Data Access Controls | Clone and wipe prevention | Data remains protected in encrypted environments until user accesses data with step-up authentication. |
Data Access Logs | Insider threat mitigation | All data access stored in secured logs accessible only to admin. Logs can be exported to SIEM for analysis or used for forensics. |
The Cigent Advantage
Cigent solutions were designed and developed with and for US Intelligence and Defense communities. All employees, including Cigent software development, are based in the US. The team includes multiple personnel with TS/SCI clearance with decades of data protection and operational experience to support your requirements.
Cigent solutions have been tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK) and are deployed across US Intelligence agencies, US Defense services, and the defense industrial base.

ebook
Protect Your Data at Rest
Cigent provides an unparalleled breadth of storage drives with hardware-based encryption enabling operators to achieve compliance mandates and ensure data remains protected in any environment.


Cigent’s Federal Data Protection Solutions are second to none
Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.