Cigent Enables Compliance Requirements
Validated full drive hardware encryption, PBA, and MFA
Federal agencies and contractors are required to meet standards to ensure sensitive or confidential data. With a growing number of devices operating at the edge collecting, processing, and storing sensitive data it is imperative that data on these devices is secured. NSA, DISA, NIST and other Federal organizations have defined guidelines for protecting data at rest on these devices. Cigent Secure Storage Solutions protect data on devices at the edge and enable organizations to meet compliance requirements.
CSfC for DAR
NSA established the Commercial Solutions for Classified (CSfC) program setting minimum requirements to protect classified data at rest (DAR) on endpoints. The NSA mandates a layered approach requiring a combination of hardware encryption and pre-boot authentication (PBA).
NSA publishes a component list of organizations who meet NSA CSfC for DAR requirements.
Cigent is on the CSfC for DAR component list providing full drive hardware encryption and pre-boot authentication solutions.
FIPs 140-2 Level 3
The National Institute of Standards and Technology (NIST) validates cryptographic modules. A product with a FIPS 140-2 certificate means that it has been tested with formal validation of the cryptographic module.
FIPS 140-2 certification are required for all devices containing sensitive data. This includes the majority of devices in Departments of Defense, State, Homeland, Justice, and other Departments and Agencies dealing with sensitive data.
Cigent Secure Storage provides FIPS 140-2 Level 3 certified drives with full drive hardware encryption and pre-boot authentication.
Executive Order 14028
EO 14028 “Improving the Nation’s Cybersecurity,” issued May 12, 2021, mandates the adoption of multifactor authentication (MFA) and encryption for endpoint devices. It also advocates the utilization of zero-trust architecture.
Cigent Secure Storage provides full drive hardware encryption with MFA meeting EO14028 requirements. Additionally, Cigent is unique in creating zero-trust endpoint architecture through hidden partitions and step-up authentication to prevent unauthorized data access.
NIAP
NIAP certification, or National Information Assurance Partnership certification, is a commercial cybersecurity product certification that ensures commercial IT products used in National Security Systems meet common criteria. NIAP certification is required by federal procurement requirements and is relevant to the Department of Defense, the Intelligence Community, and any DoD contractors or affiliates.
Cigent Secure Storage has been tested and validated NIAP providing DAR security.
The Cigent Advantage
Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).
To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.
infographic
Visualize CSfC for DAR
Cigent enables you to meet CSfC for DAR compliance, ensuring the integrity of your data for PCs and Servers.
infographic
Understand EO 14028
To ensure the integrity of sensitive data Cigent complements hardware encryption with unique, patented data protection capabilities.
ebook
Meet FIPS 140-2 Standards
At Cigent, we say: “We don’t just know data security—we are leading the way.” That is why we have compiled this comprehensive guide to FIPS 140-2.
provide value to the visitor
Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge
Edge computing demands robust security to protect sensitive data from unauthorized ..
Disk Cloning and Data Destruction to Prevent Data Security Issues
Data destruction, data erasure, and disk cloning all play a role in data security--and ..
FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules
Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..
Frequently Asked Questions
Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.
Cigent protects data on devices operating at the edge from unauthorized access. Cigent solutions secures data at rest with layered protection including hardware encryption, pre-boot authentication, and multifactor authentication. Cigent also ensures data integrity when the device is in use preventing wiping and cloning and other data attacks.
Advanced data recovery (ADR) includes a variety of techniques and technology that can be utilized to recover data from a device. ADR is not necessarily malicious as it can be utilized for the legitimate recovery of data when a device may have been physically damaged, data was inadvertently erased, or other incidents. However, actors will use ADR to circumvent protections for the secure storage of data.
Cigent employs layers of security to prohibit unauthorized data access. The foundation of Cigent protection is the combination of AES 256 full drive hardware encryption coupled with pre-boot authentication (PBA), and multifactor authentication (MFA). This combination of technologies delivers high-confidence protection for data at rest. In addition, Cigent has advanced, patented features that provide additional security and extends data protection throughout its lifecycle. These include hidden partitions with locked data ranges, storage embedded AI monitoring data access patterns, secure data logs documenting all data activity, and verified data erasure.
Cigent data at rest protection foundation is full drive hardware encryption. Cigent complements this with patented storage embedded AI that monitors data access patterns. AI embedded within the storage continually monitors data access patterns instantly securing data when anomalous behavior is detected. This includes detection if an adversary attempts an alternate O/S boot approach. The AI capabilities provide an additional tamper-proof monitoring that extends Cigent protection for ADR.
Still have questions?
Learn more about Cigent and our solutions by downloading our company overview.
Cigent’s Federal Data Protection Solutions are second to none
Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.