Organizations we support
Military
Defense Community
Sensitive and Classified Materials at the Edge
Intel (2)
Intelligence and Special Ops Community
Secret Data in Extreme Environments
FedCiv-2
Federal Civilian Solutions
Protection of Sensitive Data from Lost Device and Remote Attacks
Devices we protect
Frame 84
Servers / Enterprise
Frame 85
External Media
Industrial Control Systems
Industrial Control Systems
Frame 87(1)
Unmanned Vehicles
Portfolio
Products
Who we partner with
Handshake
Partnership
Cigent Ecosystem of Device and Service Partners
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Blog
Read articles on all things cyber security.
Learn More About Cigent
News from Cigent
4 min read
Understand FIPS 140-2, its compliance ..
Blog 3 min read
Why federal agencies need to protect sensitive ..
Menu Close
Hero

Protect Endpoint Data in Federal Civilian Agencies

FIPS 140-2 Data Encryption with Multifactor Authentication

Intro

Layered Data Protection

Endpoints continue to be a source of vulnerability with devices going missing or being infected leading to data compromise. Cigent provides a single solution enabling organization to meet FIPS data at rest standards, address EO 14028 multifactor authentication requirements, and defeat remote attacks including ransomware.

Cigent is unique providing integrated hardware and software protection for a variety of devices operating at the edge including PCs, Servers, External Storage, and Unmanned Vehicles.

iStock-1427847593
Advanced and Persistent Threat Protection - Cobalt Blue

Meet Compliance

Extensive validation of portfolio by NSA, NIAP, NIST and other leading agencies including FIPS 130-2 and CSfC for DAR certification.

Data at Rest Encryption

Data at Rest Encryption

NSA and NIAP validated full-drive AES 256-bit hardware encryption technology with pre boot authentication and multifactor authentication.

Multifactor Authentication

Multifactor Authentication

Cigent delivers multi-factor authentication capabilities addressing EO14028 requirements.  Cigent provides the option for both pre and post-boot authentication.

Prevent Data Attack

Prevent Data Attacks

Stop ransomware and other remote data attacks with step-up authentication preventing data encryption, exfiltration, tampering or wiping.

Advanced and Persistent Threat Protection - Cobalt Blue-1

Advanced Data Protection

Cigent layered protections prevent advanced data recovery techniques when an adversary has gained access to the device.

Efficient Administration

Enterprise Management

Cigent provides an enterprise management console available in the cloud and on premise and a command line interface available on Windows and Linux. Capabilities include key management, compliance reporting, deployment automation and others.

Layout 1
Device Coverage

Breadth of Device Coverage

Evolving technology and mission requirements is resulting in a proliferation of devices with sensitive data at the edge. Cigent provides the most extensive portfolio of secured storage devices providing a single trusted partner to ensure all endpoint data is protected.
PCs
PCs are a critical tool where sensitive data is processed and stored. Toensure the integrity of the data it is essential that they use full drive hardware encryption withpre-boot authentication (PBA).
Servers
Edge computing requirements are increasing the utilization of servers outside of secured data centers. Servers store and process substantial data and have become compact and lighter with an individual server weighing as little as 25 pounds.
External Media
External media includes a variety of storage devices including flash drives, external storage devices, and SD and MicroSD Cards. Advancement in storage capabilities enable these small form factors to store massive amounts of potentially sensitive data.
Industrial Control Systems
Cigent protects data collected, processed, and stored by Industrial Control Systems (ICS) with multiple Secure Storage Solutions with integrated hardware and software capabilities.
Unmanned Vehicles
Unmanned vehicles (UV) are undergoing rapid proliferation andtransformation with increasing data storage. Operating in high-risk environments, UV carrysensitive data including valuable algorithms that require protection.
Untitled design (35)
BENEFITS

What makes Cigent unique

Encryption and PBA provide foundational data security, but evolving sophisticated adversaries present additional risk.  Cigent provides portfolio of cyber security features to mitigate risk. These include:

Expertise

Expertise

The Cigent team includes leading experts in data recovery and sanitization with decades of practical experience and a commitment to support US agencies.

Ecosystem

Ecosystem

Cigent has been validated by and works with all leading CSfC for SIs providing integrated solutions including District Defend and Secure View

Portfolio

Portfolio Breadth

Cigent offer broadest range of Secure storage coverage including PCs, Servers, Laptops External, Media, and Embedded for IOT, OT, and vehicles.

Ease of Engagement

Ease of Engagement

Streamline procurement exercise by sourcing devices or secured storage directly from manufacturers including Dell, HP, GETAC and others

Resources / Blog
Introduce resources that can
provide value to the visitor
4 min read

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules

Understand FIPS 140-2, its compliance requirements for federal agencies, and the ..

Blog 3 min read

Adding Pre-Boot User Authentication for Sensitive Data Security

Why federal agencies need to protect sensitive and classified data with pre-boot user ..

Blog 2 min read

Data Security for Unmanned Vehicles—both UAV and UGV

Ensure data security for unmanned vehicles with advanced protection methods. Learn about ..

Frequently Asked Questions

Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.

What does Cigent do?

Cigent protects data on devices operating at the edge from unauthorized access. Cigent solutions secures data at rest with layered protection including hardware encryption, pre-boot authentication, and multifactor authentication. Cigent also ensures data integrity when the device is in use preventing wiping and cloning and other data attacks. Secure Storage includes patented capabilities that verify data erasure to provide end-to-end lifecycle protection.

How does Cigent work?

To prevent sophisticated adversaries from unauthorized access requires layered protection. The foundation of Cigent solution is 256-AES full drive hardware encryption with pre-boot and multifactor authentication. These capabilities have been validated by agencies including NSA and NIAP. Additionally, Cigent provides capabilities that ensure the integrity of data through its lifecycle including hidden partitions, storage-embedded AI, and verified data erasure.

What agencies does Cigent support?

Cigent secure storage solutions have been validated by NSA, NIST, NIAP, DISA and can be used across Federal civilian agencies with sensitive and classified data.

Have Cigent Secure Storage been tested and validated?

Yes, Cigent secure storage have been tested, vetted and deployed by US Federal Agencies and with key Defense Contractors and Integrators. Federal agencies include MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK). Additionally leading CSfC integrators, including Booz Allen Hamilton District Defend, AFRL’s SecureView, Everfox Trusted Thin Client, Integrated Global Security, Army APG, and CACI ID Tec’s Archon utilize Cigent Secure Storage.

What is data-at-rest encryption?

Data at rest encryption traditionally refers to the encryption of data when the device is asleep or powered-off. Data at rest encryption seeks to prevent adversaries who gain physical access to the device would seek to extract sensitive data. Cigent uses AES 256 full drive hardware encryption with pre-boot and multifactor authentication. In addition, Cigent uses zero-trust access to control to also protect data when a device is in use. This is with hidden partitions that maintain encryption until it is accessed with step-up authentication.

What devices does Cigent protect?

Cigent provides the widest breadth of secure storage solutions all utilizing hardware encryption. These include: PCs supporting both M.2 2280 and the emerging M.2 2230 standard, remote servers and NAS devices with U.2 drives, external media with flash drives, encrypted external drives, SD and Micro SD cards, and embedded for SSD BGA.

Why do I need hardware encryptions vs relying on software encryption?

Protecting sensitive data from advanced threat actors requires layers of protection. Software encryption provides a basic level of protection but can be defeated using a variety of techniques and technologies. This is why the NSA, DISA, NIAP and other leading experts require full drive hardware encryption to meet standards including CSfC for data at rest and FIPS 140-2. Ideally organizations use a combination of software and hardware encryption with pre boot authentication and multifactor authentication providing layers of protection that can defeat the most sophisticated threat actors.

Does Cigent help with certifications?

Yes, Cigent Secure Storage Solutions can support organizations meeting Commercial Solutions for Classified (CSfC) for data at rest including pre-boot authentication requirements. Cigent solutions can also meet FIPS 140-2 and 140-3 standards. Additionally, Cigent can address requirements from Executive Order 14028 including encryption of data at rest, multi-factor authentication, and the utilization of zero-trust access control.

Still have questions?

Learn more about Cigent and our solutions by downloading our company overview.

Card

Cigent’s Federal Data Protection Solutions are second to none

Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.