Organizations we support
Military
Defense Community
Sensitive and Classified Materials at the Edge
dib-star
Defense Industrial Base
Safeguard Sensitive and Classified Data at the Edge
Intel (2)
Intelligence and Special Ops Community
Secret Data in Extreme Environments
FedCiv-2
Federal Civilian Solutions
Protection of Sensitive Data from Lost Device and Remote Attacks
Local or Remote Admin
Commercial Solutions
Data Protection for the Modern Workspace
Devices we protect
Frame 84
Servers / Enterprise
Frame 85
External Media
Industrial Control Systems
Industrial Control Systems
Frame 87(1)
Unmanned Vehicles
Portfolio
Products
Who we partner with
Handshake
Partnership
Cigent Ecosystem of Device and Service Partners
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Blog
Read articles on all things cyber security.
Learn More About Cigent
News from Cigent
4 min read
Edge computing demands robust security to protect ..
4 min read
Data destruction, data erasure, and disk cloning ..
Menu Close
Market - Tank (2)-1

Effectively, efficiently meet CSfC for DAR Compliance

Achieve unparalleled data protection for PCs and Servers

The NSA's Commercial Solutions for Classified (CSfC) program sets stringent requirements to protect classified information. To ensure classified data on vulnerable edge devices is not compromised the NSA requires layered protection. Cigent provides a single solution with integrated hardware and software that meets CSfC Data at Rest compliance.
Frame 93 (4)

Single Solution

Cigent is unique providing its own integrated hardware and software solution including full drive hardware encryption and pre boot authentication (PBA).

Efficient Administration

Enterprise Administration 

Cigent is unique in providing scalable management of Secure Storage including on prem and cloud management console and Command Line Interface (CLI) tool that runs in Linux and Windows.

Ecosystem

Robust Ecosystem

Cigent is working with all major CSfC integrators including AFRL, Booz Allen, CACI, and Exerfox to enable your mission requirements. With successful deployments including SecureView and Data Defense the Cigent solution is tested and trusted by leading security experts.

Easy to Aquire

Easy to Acquire

Cigent seeks to streamline your procurement process with Cigent Secure Storage available directly from major device manufacturers including Dell, HP, and GETAC.

Layout 1 (1)
CAPABILITIES

Protection for Data at the Edge

Trusted Encryption

Protecting data at rest requires layered protection including robust encryption complemented by pre-boot authentication (PBA) and multi-factor authentication (MFA).

AES 256-bit Hardware Encryption

Cigent proven and tested methodology for encryption that has undergone rigorous testing by NSA, DISA and other Federal agencies.

Pre-boot Authentication (PBA)

PBA is a critical security capability to prevent adversary from circumventing full drive encryption.  PBA provides a separate, secure authentication prior to initiating boot.  Cigent PBA has been validated by NSA for CSfC for DAR.   

Multifactor Authentication (MFA)

Optional configuration with PBA provides MFA capability requiring use of both U/N Password and smart card (CAC).

Screenshot 2024-09-05 045448

Advanced Data Capabilities

Encryption is the foundation, but advanced adversaries have multiple methods of compromising data. Cigent features deliver unparallel protection including prevention of cloning and wiping.

Hidden Partitions

Ability to create hidden partition generating enclaves to store sensitive data preventing an adversary from discovering even the existence of the data. The hidden partitions are unreadable at the sector level even after logging onto the device until unlocked using step-up authentication.

Cloning and Wiping Prevention

Full drive encryption and hidden partitions lock all ranges preventing malicious compromise. Data secured within hidden partitions remains unreadable even if the device is in use.

Verified Data Erasure

Cigent Secure Storage provides the capability to initiate the data erasure command locally or remotely with a combination of crypto and full block wipe. Additionally, with Verified Data Erasure they can perform block-by-block analysis to ensure that all data has been permanently erased. This patented solution provides confidence in emergency data destruction situations, addresses risk from emerging quantum capabilities, and provides potential for drive reuse.

Secure Data Logs

Cigent captures every data transaction in secured, tamper-proof logs. Information be used to detect malicious insider activity and provide valuable forensics.

Screenshot 2024-09-05 045448
DEVICES

Devices Protected

Cigent provides the broadest range of offerings including coverage for PCs
with 2280 and a 2230 drives and Enterprise Storage.

PCs:

Secure Storage 2280 SSD:

2280 is the legacy standard for storage configuration on PCs

Secure Storage 2230 SSD

2230 is an emerging standard for device manufactures storage configurations including Microsoft Surface, Dell Latitude, and HP EliteBooks

Cigent is the only provider of secure storage 2230 with PBA that has been approved by the NSA

Enterprise Storage

Secure Enterprise Storage CSfC

Cigent provides exclusive capabilities to protect servers operating on the edge. Provides full drive hardware encryption, PBA with MFA, and advanced capabilities including verified data erasure.

Secure Boot 2280 SSD Bravo

A boot drive is a storage device that contains the files needed to start a computer's operating system (OS) or firmware when it is turned on or restarted.  Cigent ensures these critical drives are protected with features including full drive hardware encryption with PBA, enterprise management, hidden partitions, cloning and wipe prevention, verified data erasure, and command logs.

The Cigent Advantage

Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).

To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.

iStock-814367282

infographic & datasheet

Visualize CSfC for DAR

Infographic-Protect-Your-Data-with-CSfC-for-DAR-by-Cigent-11-19-2024_09_50_AM
Resources / Blog
Introduce resources that can
provide value to the visitor
4 min read

Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge

Edge computing demands robust security to protect sensitive data from unauthorized ..

4 min read

Disk Cloning and Data Destruction to Prevent Data Security Issues

Data destruction, data erasure, and disk cloning all play a role in data security--and ..

Blog 4 min read

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules

Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..

Frequently Asked Questions

Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.

Question text goes here

Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.

Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.

Question text goes here

Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.

Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.

Question text goes here

Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.

Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.

Question text goes here

Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.

Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.

Question text goes here

Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.

Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.

Still have questions?

Download Company Overview

Card

Cigent’s Federal Data Protection Solutions are second to none

Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.