Servers
Secure Servers Operating at the Edge
Edge computing requirements are increasing the utilization of servers outside of secured data centers. Servers have become compact and lightweight while their processing and storage capacity has increased. Cigent delivers full drive hardware encryption to ensure the integrity of data of servers operating at the edge.
Benefits
Protect Data at Rest
Effective protection of data at rest (DAR) requires layers of protection technology to prevent unauthorized access. Cigent’s solution uses proven, and NSA validated encryption methodology, including full drive AES-256-bit hardware encryption.
AES 256-bit Hardware Encryption
Cigent proven and tested methodology for encryption that has undergone rigorous testing by NSA, DISA and other Federal agencies.
Pre-boot Authentication (PBA)
PBA is a critical security capability to prevent adversary from circumventing full drive encryption. PBA provides a separate, secure authentication prior to initiating boot. Cigent PBA has been validated by NSA for CSfC for DAR.
Multifactor Authentication (MFA)
Optional configuration with PBA provides MFA capability requiring use of both U/NPassword and smart card (CAC).
CSfC DAR Component List
To ensure sensitive data is secured from malicious actors, NSA requires layered protections. Cigent, with its drive partners provides a single CSfC-compliant Data at Rest (DAR) solution.
Enterprise Administration
Cigent is unique in providing scalable management of Secure Storage including on prem and cloud management console and Command Line Interface (CLI) tool that runs in Linux and Windows.
Advanced Data Security
Military grade encryption is the foundation, but advanced adversaries have multiple methods of compromising data. Cigent features deliver unparallel protection including prevention of cloning and wiping.
Portfolio
Secure Storage Solutions for Servers
Cigent offers a portfolio of secured storage options to meet mission requirements.
01.
Secure Enterprise Storage Alpha
Features include full drive hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, data erasure, and crypto and full block erasure.
02.
Secure Enterprise Storage CSfC Alpha
NSA CSfC DAR Component List. Features include full drive hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, data erasure, and crypto and full block erasure.
03.
Secure Boot 2280 SSD Bravo
A boot drive is a storage device that contains the files needed to start a computer's operating system (OS) or firmware when it is turned on or restarted. Cigent ensures these critical drives are protected with features including full drive hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, verified data erasure, and command logs.
Features
Server Solution Capabilities
The Cigent Advantage
Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).
To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.
FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules
Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..
Adding Pre-Boot User Authentication for Sensitive Data Security
Why federal agencies need to protect sensitive and classified data with pre-boot user ..
Data Security for Unmanned Vehicles—both UAV and UGV
Ensure data security for unmanned vehicles with advanced protection methods. Learn about ..
Frequently Asked Questions
Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.
Servers have become more compact and more flexible resulting in an increasing number deployed outside of traditional data centers. Remotely deployed servers are at risk of loss or theft potentially exposing the significant data that resides on them. Protection of data on servers requires the same protection for data as PCs including full drive encryption utilizing pre boot authentication.
Protecting sensitive data from advanced threat actors requires layers of protection. Software encryption provides a basic level of protection but can be defeated using a variety of techniques and technologies. This is why the NSA, DISA, NIAP and other leading experts require full drive hardware encryption to meet standards including CSfC for data at rest and FIPS 140-2. Ideally organizations use a combination of software and hardware encryption with pre boot authentication and multifactor authentication providing layers of protection that can defeat the most sophisticated threat actors.
Cigent offers secure storage on U.2 SSD which is the standard storage for workstations and remote servers. The U.2 SSD provides AES 256 full drive encryption that has been validated by leading Federal agencies including NIST, NSA, and NIAP.
Cloning and wiping are common attacks where an adversary will copy or “clone” a drive and/ or erase or “wipe” a drive. Clone and wipe attacks can take place when a device is at rest or in use. When a device is in use an adversary with physical access can execute an attack in only a few seconds. Cigent prevents cloning and wiping by locking all data ranges. Utilizing hidden partitions data remains protected even when a device is unlocked.
Still have questions?
Learn more about Cigent and our solutions by downloading our company overview.
Cigent’s Federal Data Protection Solutions are second to none
Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.