Industrial Control Systems
Protecting Data on Industrial Control Systems
Industrial Control Systems (ICS) capabilities are advancing rapidly optimizing efficiency and reducing or eliminating manual tasks. Subsequently ICS is collecting, processing, and warehousing increasing volumes of data that may be sensitive and or classified and needs to be protected.
Benefits
Protect Data at Rest
Cigent provides a portfolio of Secure Storage Solutions for Industrial Control Systems. With integrated hardware and software capabilities they deliver layered protection to secure data at rest and throughout its lifecycle. Cigent solutions have been tested and validated by leading Federal agencies including NSA, NIST, DISA, and NIAP.
Data at Rest Protection
Cigent Secure Storage Solutions utilize AES 256 full drive hardware encryption to ensure data at rest (DAR) is protected. The full drive encryption is complemented with pre-boot authentication (PBA) and multifactor authentication (MFA) providing a comprehensive DAR protection solution. Cigent technology and methodology has been tested and vetted and meets FIPS 140-2 and CSfC for DAR standards.
Verified Data Erasure
Various use cases will require data to be permanently erased from ICS devices. Cigent provides crypto and block erasure. Additionally, it includes a patented capability that executes a block-by-block analysis verifying all data has been permanently erased.
Insider Threat Logs
Cigent maintains incorruptible logs of all data activity. The logs record every data transaction stored in an encrypted document. Even sophisticated actions like booting directly from USB drive will not circumvent the logs providing foolproof log of activities.
Enterprise Administration
Cigent is unique in providing scalable management of Secure Storage including on prem and cloud management console and Command Line Interface (CLI) tool that runs in Linux and Windows.
Features
Industrial Control Systems
Cigent Advantages
Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).
To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.
FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules
Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..
Adding Pre-Boot User Authentication for Sensitive Data Security
Why federal agencies need to protect sensitive and classified data with pre-boot user ..
Data Security for Unmanned Vehicles—both UAV and UGV
Ensure data security for unmanned vehicles with advanced protection methods. Learn about ..
Frequently Asked Questions
Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.
Operational technology (OT) is a broad range of hardware and software that monitors and controls industrial equipment, processes, and events. OT systems can detect or directly change these systems through monitoring and control.
Operational technology capabilities are advancing rapidly optimizing efficiency and reducing or eliminating manual tasks. The development and incorporation of AI will further accelerate OT capabilities. Subsequently OT will be collecting, processing, and warehousing increasing volumes of data that may be sensitive and or classified. Like other devices OT are susceptible to unauthorized data access particularly when adversary has direct access to the device. Protection of data at rest with full drive hardware encryption provides foundational security preventing unauthorized access of data on OT devices.
Cigent provides multiple secure storage to support Unmanned Vehicle operations. These include M.2 2230 SSD that provides full drive hardware encryption, the ability to create up to eight separate hidden partitions, and patented verified data erasure. Additionally, Cigent offers SSD BGA with full drive hardware encryption, the ability to create hidden partitions, and remote and policy data erasure. Both of these drives have Automotive temperature ratings. Additionally, Cigent provides the flexibility and security of hardware encryption on SD and MicroSD cards. These also include the ability to create hidden partitions and data erasure and have Industrial temperature ratings.
An increasing array of devices, including manned and unmanned vehicles, are collecting, processing, and storing data. All or some of this data may be of a sensitive nature. If the devices were to be lost, stolen, or captured, it is critical to ensure the integrity of the sensitive data by preventing unauthorized access. Cigent provides full drive hardware encryption for BGA providing robust protection for data. Additionally, users can create hidden partitions that created secure enclaves that are unreadable at the sector level.
Embedded storage is a type of storage that is embedded onto a motherboard. It is often designed into a system from the beginning, making it difficult to replace. The benefits of embedded storage include increased reliability due to their dedicated function, lower power consumption, compact size, and the ability to perform real-time operations.
Yes, Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).
Still have questions?
Learn more about Cigent and our solutions by downloading our company overview.
Cigent’s Federal Data Protection Solutions are second to none
Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.