Organizations we support
Military
Defense Community
Sensitive and Classified Materials at the Edge
dib-star
Defense Industrial Base
Safeguard Sensitive and Classified Data at the Edge
Intel (2)
Intelligence and Special Ops Community
Secret Data in Extreme Environments
FedCiv-2
Federal Civilian Solutions
Protection of Sensitive Data from Lost Device and Remote Attacks
Local or Remote Admin
Commercial Solutions
Data Protection for the Modern Workspace
Devices we protect
Frame 84
Servers / Enterprise
Frame 85
External Media
Industrial Control Systems
Industrial Control Systems
Frame 87(1)
Unmanned Vehicles
Portfolio
Products
Who we partner with
Handshake
Partnership
Cigent Ecosystem of Device and Service Partners
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Blog
Read articles on all things cyber security.
Learn More About Cigent
News from Cigent
4 min read
Edge computing demands robust security to protect ..
4 min read
Data destruction, data erasure, and disk cloning ..
Menu Close
Market - Tank (2)

Enterprise Management for Secure Storage

Manage efficiently at scale

Effective protection is contingent on deployment and administration of the solution. Cigent provides multiple options for management of secure storage at scale. Cigent provides an enterprise management console that can be deployed in the cloud or on premises.
Prevent Ransomware & All Other Attacks  - Cobalt Blue 1 (1)

Enterprise Management Console

Enterprise management console that can be deployed in the cloud or on premises

Frame 93 (6)

Command Line Interface

Command Line Interface (CLI) tool that runs in Linux and Windows.

Frame 93 (8)

Robust Administration

Administration tools include key management, compliance reporting,policy setting and incident response.

Frame 93 (7)

Recover & Destroy Data

PBA keeps secure, comprehensive log including Logout, Useradd/edit/delete, Log purge and Platform update.

Layout 1 (1)
Capabilities

Enterprise Management Features

Configuration

Install/Uninstall/Enable/Disable platform

Drive Erasure

User Configuration

Platform configuration

AdobeStock_199768165

Monitoring

Installation Status

Users

Current Settings

Activity Log

AdobeStock_199768165

Reporting

Custom reports with time, device, user specific filtering

Automated report generation

AdobeStock_199768165
TAGLINE

Cigent Advantages

Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).

To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.

6
Resources / Blog
Introduce resources that can
provide value to the visitor
4 min read

Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge

Edge computing demands robust security to protect sensitive data from unauthorized ..

4 min read

Disk Cloning and Data Destruction to Prevent Data Security Issues

Data destruction, data erasure, and disk cloning all play a role in data security--and ..

Blog 4 min read

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules

Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..

Frequently Asked Questions

Frequently asked questions ordered by popularity. Remember that if the visitor has not committed to the call to action, they may still have questions (doubts) that can be answered.

Question text goes here

Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.

Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.

Question text goes here

Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.

Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.

Question text goes here

Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.

Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.

Question text goes here

Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.

Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.

Question text goes here

Lorem ipsum dolor sit amet consectetur. Dui id aliquam justo commodo est tempor morbi. Id at semper sed laoreet. Platea nulla lectus purus id mus arcu molestie integer varius.

Tincidunt platea lorem posuere erat eu habitant. Feugiat tellus tristique odio mauris a eu mi non diam. Et proin vulputate elementum morbi id enim habitant volutpat habitasse. Purus arcu consectetur mauris.

Still have questions?

Support details to capture customers that might be on the fence.

Card

Cigent’s Federal Data Protection Solutions are second to none

Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.