
Advanced Adversary Protection
Advanced data recovery techniques, including quantum computing, can overcome or circumvent standard protection.
The Threat is Real
Advanced data recovery tools and methodologies have proliferated. These include clone and wiping, alternative OS boot, employing Hex Readers, and even employing electron microscope to find keys.
And the risk of quantum computing is emerging. Quantum computing’s speed and ability factor large integers will inevitably significantly disrupt current crypto protection methodologies. Adversaries are already collecting encrypted data in the expectation that they will be able to gain access as quantum becomes available.

Cigent Protection
Cigent was designed and developed by a leading expert in data exfiltration. Leveraging decades of operational experience Cigent security was developed for and with top Federal agencies to prevent unauthorized data access from advanced adversaries.
Multiple Encryption Layers
Cigent provides hardware, software, and file encryption using independent cryptography validated by NIAP and NSA. Each of these layers provides independent protection requiring adversary to circumvent all three layers.

Pre-boot Authentication
PBA is an essential element to ensure the efficacy of full drive encryption. PBA provides a secure environment to authentication drive prior to OS boot. Without PBA adversaries can intercept OS and gain access to encryption keys.

Secure Partitions
Ability to create separate locked partitions where data is locked and unreadable at the sector level. Drives can be enable to remain locked even when device is in use with access through step-up authentication Adversary would be unable to even locate drives existence protecting data from clone & wiping or future quantum attacks.

Verified Data Sanitization
Data sanitization ensures adversaries are unable to gain access to data. Block erasure, while effective, frequently does not erase all data. Cigent provides patented firmware capability to verify data has been erased ensuring adversary cannot recovery data.
.png?width=2000&name=Layout%201%20(1).png)
Preventing Advanced Threats
Cigent protects against all known threat vectors:
Quantum Attacks
While quantum computing has not currently been practically applied to cryptography it is only a matter of time. There have been continuous improvements in stability and performance, including China’s 2024 announcement of a 504-Qbit chip that is claimed to be 180 million times faster than the fastest supercomputer. Quantum computing’s speed and ability factor large integers will inevitably significantly disrupt current crypto protection methodologies.
Secure Partitions
Cigent provides the ability to create secure partitions that can only be accessed with step-up authentication. Those partitions are unreadable at the sector level even if an adversary gets direct physical or remote access and logs into the operating system.
Embedded AI
Cigent has embedded AI in its Cigent Secure Storage that monitors data access patterns. This unique protection attempts to clone the drive and automatically locks thwarting a cloning attempt.
Verified Data Erasure
The only full-proof approach to ensuring data cannot be compromised by quantum is to ensure it is permanently erased. Cigent provide patented verified data erasure that scan block-by-block to ensure that all data is erased and forever unretrievable.
-2.png?width=560&height=365&name=Rectangle%203%20(1)-2.png)
Clone and wipe
Cloning is the process of duplicating data from the hard drive which may also include the wiping of data. The most common approach is inserting a USB drive that can nearly instantaneously execute the attack, but a variety of methods exist including utilizing Bluetooth for over the air attacks.
Unreadable Data
Regardless of device state, data is unreadable, preventing data from being cloned or wiped. When the device is at rest, Cigent full drive encryption locks all ranges thereby preventing access.
Hidden Partitions
When the device is in use Cigent can maintain protection through the implementation of hidden partitions. These partitions maintain the encrypted, locked ranges. Authorized users access files through efficient step-up-authentication.
AI Data Monitoring
Additional protection is provided with Cigent embedded AI data monitoring. The unique approach monitors access patterns and will instantly lock all data when a cloning attempt is detected.

Advanced Data Recovery Techniques
Sophisticated threat actors will employ multiple techniques to circumvent full drive encryption. Common methods include
Hex Editor Forensic Tools
Including WinHex or other Hex editors
Third party software
Multiple solution i.e. Passcode kits commercially available with more sophisticated version available via DarkWeb
Equipment
Chip Reader (performing a chip-off recovery) and viewing using a chip reader.

Cigent Protection: Hidden Partitions
Hidden Partitions can be used to protect against all the advanced recovery methods described above. When the Hidden Partitions are locked using either CLI or Data Defense software the partitions are locked using AES-256 encryption. Hex editors, third party tools and/or equipment cannot see and/or recover the encrypted data. The data is unreadable at the sector level due to the hidden partition. Even if a threat actor gains access to the user login, the data is protected in the hidden partitions and requires step-up authentication to unlock.

The Cigent Advantage
Cigent solutions were designed and developed with and for US Intelligence and Defense communities. All employees, including Cigent software development, are based in the US. The team includes multiple personnel with TS/SCI clearance with decades of data protection and operational experience to support your requirements.
Cigent solutions have been tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK) and are deployed across US Intelligence agencies, US Defense services, and the defense industrial base.

ebook
Protect Your Data at Rest
Cigent is prepared to support your mission navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Read our extensive eBook to learn more.

provide value to the visitor

Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge
Discover best practices for protecting sensitive data at the edge with Cigent's insights ..

Prevent Data Security Issues with Disk Cloning & Data Destruction
Explore how disk cloning and data destruction can prevent security issues. Learn how to ..

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules
Learn about FIPS 140-2 and FISMA compliance for cryptography modules, essential for ..
Frequently Asked Questions
Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.
Cigent protects data on devices operating at the edge from unauthorized access. Cigent solutions secures data at rest with layered protection including hardware encryption, pre-boot authentication, and multifactor authentication. Cigent also ensures data integrity when the device is in use preventing wiping and cloning and other data attacks.
To prevent sophisticated adversaries from unauthorized access requires layered protection. The foundation of Cigent solution is 256-AES full drive hardware encryption with pre-boot and multifactor authentication. These capabilities have been validated by agencies including NSA and NIAP. Additionally, Cigent provides capabilities that ensure the integrity of data through its lifecycle including hidden partitions, storage-embedded AI, and verified data erasure.
Data at rest encryption traditionally refers to the encryption of data when the device is asleep or powered-off. Data at rest encryption seeks to prevent adversaries who gain physical access to the device would seek to extract sensitive data. Cigent uses AES 256 full drive hardware encryption with pre-boot and multifactor authentication. In addition, Cigent uses zero-trust access to control to also protect data when a device is in use. This is with hidden partitions that maintain encryption until it is accessed with step-up authentication.
Pre-boot authentication (PBA), also known as power-on authentication, is a security feature that requires users to authenticate before their device boots up. PBA is a layered approach that protects devices and data from offline attacks and cyberattacks. It's often used with full disk encryption (FDE), where users must authenticate to boot the system and restore data. Cigent PBA has been tested and validated by leading organizations including NSA, DISA, NIST, and NIAP.
Cigent provides the widest breadth of secure storage solutions all utilizing hardware encryption. These includes: PCs supporting both M.2 2280 and the emerging M.2 2230 standard, remote servers and NAS devices with U.2 drives, external media with flash drives, encrypted external drives, SD and Micro SD cards, and embedded for SSD BGA.
Yes, Cigent Secure Storage Solutions can support organizations meeting Commercial Solutions for Classified (CSfC) for data at rest including pre-boot authentication requirements. Cigent solutions can also meet FIPS 140-2 and 140-3 standards. Additionally, Cigent can address requirements from Executive Order 14028 including encryption of data at rest, multi-factor authentication, and the utilization of zero-trust access control. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).
Still have questions?
Learn more about Cigent and our solutions by downloading our company overview.

Cigent’s Federal Data Protection Solutions are second to none
Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.