Organizations we support
Military
Defense Community
Sensitive and Classified Materials at the Edge
Intel (2)
Intelligence and Special Ops Community
Secret Data in Extreme Environments
FedCiv-2
Federal Civilian Solutions
Protection of Sensitive Data from Lost Device and Remote Attacks
Devices we protect
Frame 84
Servers / Enterprise
Frame 85
External Media
Industrial Control Systems
Industrial Control Systems
Frame 87(1)
Unmanned Vehicles
Portfolio
Products
Who we partner with
Handshake
Partnership
Cigent Ecosystem of Device and Service Partners
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Blog
Read articles on all things cyber security.
Learn More About Cigent
News from Cigent
4 min read
Understand FIPS 140-2, its compliance ..
Blog 3 min read
Why federal agencies need to protect sensitive ..
Menu Close
Market - Tank (1)-1

Verified Data Erasure

Ensuring all sensitive data has been permanently erased

Increasing sophistication of advanced data recovery techniques and new technology like quantum computing means all data is at risk. Recognizing this risk, the NSA issued Manual 9-12 providing specific, detailed guidance for the physical destruction of drives to prevent data recovery. With the increase of devices operating at the edge with sensitive physical destruction will not always be possible. Cigent provides advanced data erasure capabilities including patented verified data erasure to ensure data is permanently erased.
Crypto Erasure

Crypto Erasure

Crypto erases works by destroying the encryption key needed to access encrypted data. The encrypted data remains on the storage device, but it's effectively impossible to decrypt, It can execute in milliseconds providing option for emergency situations.

Block Erasure

Block Erasure

Block erasure erases solid-state drives (SSDs) by using the drive's internal functions to electrically erase each block. Block erasure delivers the permanent elimination of data on an SSD

Frame 93 (5)

Verified Data Erasure

Patented capability provides block-by-block analysis of drive to ensure all data has been permanently erased. Policy can continue to erase data until confirmation all data has been erased.

Local or Remote Admin

Local or Remote Execution

Cigent provides the option of initiating execution commands locally or remotely. Cigent provides enterprise management console deployed locally or in the cloud and a Command Line Interface (CLI) to execute erasure.

Layout 1 (1)
Benefits

Ensure Data is Destroyed

Emergency Data Erasure

Ensure data is erased, locally, remotely, or by policy. Crypto erase executes in milliseconds, with block erasure providing data eradication. Patented verified data erasure provides certainty that all data is permanently erased.

Screenshot 2024-09-05 054650

Address Quantum

Emerging quantum capabilities will challenge cryptographic protections. Nation states are collecting encrypted data with the expectation of use quantum to compromise the protections. Verified data erasure with block-by-block analysis ensures that data will not be compromised by future capabilities.

Screenshot 2024-09-05 054650

Drive Reuse

Cigent verified data erasure provides alternative to the physical destruction of drives to prevent unauthorized data recovery. The certainty provided by the patented solution allows drives to be reused or recycled providing lower cost and greener alternatives.

Screenshot 2024-09-05 054650

The Cigent Advantage

Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).

To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.

iStock-814367282
Resources / Blog
Introduce resources that can
provide value to the visitor
4 min read

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules

Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..

Blog 3 min read

Adding Pre-Boot User Authentication for Sensitive Data Security

Why federal agencies need to protect sensitive and classified data with pre-boot user ..

Blog 2 min read

Data Security for Unmanned Vehicles—both UAV and UGV

Ensure data security for unmanned vehicles with advanced protection methods. Learn about ..

Frequently Asked Questions

Frequently asked questions ordered by popularity. Remember that if the visitor has not committed to the call to action, they may still have questions (doubts) that can be answered.

Still have questions?

Support details to capture customers that might be on the fence.

Card

Cigent’s Federal Data Protection Solutions are second to none

Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.