How We Help
DAR Protection
Quantum & Advanced Threat Protection
Data Sanitization
Insider Threat Protection
Capabilities
Products
Preboot
Cigent PBA
Prevent Data Attack
Cigent FDE
Prevent Ransomware & All Other Attacks - Cobalt Blue 1(1)
Cigent SSD Clients
Frame 84
Cigent SSD Enterprise
Frame 87(1)
Cigent SSD UxV
Industrial Control Systems
Cigent SSD ICS
Hex Editor
Custom Projects
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Blog
Read articles on all things cyber security.
Who we partner with
Handshake
Partners
Cigent Ecosystem of Device and Service Partners
compatible sed devices
Certified Drives
SED Devices Compatible with Cigent
Learn More About Cigent
News from Cigent
4 min read
Discover best practices for protecting sensitive ..
4 min read
Explore how disk cloning and data destruction can ..
Menu Close
Hero (1)
PCs

Protect Data at Rest on PCs

Layered protection for data at rest to achieve CSfC for DAR requirements with solutions accessible directly from leading PC manufacturers.

Benefits

Protect Data at Rest

PCs are the critical productivity tools. Emerging Artificial Intelligence capabilities will increase their utility and increase risk as more sensitive data is stored and processed at the edge. Layered protection are necessary to prevent unauthorized access to sensitive data.

Hardware Full Drive Encryption

AES 256-bit hardware encryption is validated by NIAP with multiple drives listed on NSA CSfC for DAR component list. With PBA, provides the outer layer of CSfC for DAR compliance requirements.

Pre-boot Authentication (PBA)

PBA provides a separate, secure authentication prior to initiating boot. Validated by NIAP and listed on NSA CSfC for DAR component list. With hardware FDE provides the outer layer of CSfC for DAR compliance.

Software Full Drive Encryption

Full-drive AES 256-bit software full -drive encryption validated by NIAP. Undergoing CSfC certification. Includes MFA providing the inner layer of CSfC for DAR compliance requirements.

Untitled design (35)
Compliance-1

CSfC DAR Component List

Cigent provides SSDs and software to meet NSA CSfC for DAR compliance with capabilities that address outer and inner layer requirements.

Efficient Administration

Enterprise Administration

Cigent Command Line Interface tool seamlessly connects within existing enterprise management providing administration at scale for Linux and Windows.

Block Erasure

Data Sanitization

Data is erased using crypto and block erasure methods. Execution can be initiated locally, remotely, or with automated rules-based policy. Additionally patented firmware verification ensures all data is destroyed.

Easy to Aquire

Simplify Procurement

Cigent and its SSD partner, Digistor, partner with leading PC OEMs including Dell, HP, Getac, and Panasonic. Complete CSfC validated solutions are available directly with your PC.

Layout 1

SSD Portfolio

Cigent offer multiple SSD options that are in process of NIAP SSD validation for inclusion on CSfC for DAR component list. Cigent also partners with Digistor rigorously testing Cigent PBA and FDE with their portfolio of SSDs.

Cigent SSD portfolio for PCs include:

M.2 2230

Available with 256GB, 512GB, 1TB capacity

M.2 2280

Available with 256GB, 512GB, 1TB, 2TB capacity

The Cigent Advantage

Cigent solutions were designed and developed with and for US Intelligence and Defense communities. All employees, including Cigent software development, are based in the US. The team includes multiple personnel with TS/SCI clearance with decades of data protection and operational experience to support your requirements.

Cigent solutions have been tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK) and are deployed across US Intelligence agencies, US Defense services, and the defense industrial base.

Rectangle 3(2)
data sheet

Learn About PC Security

PCs are critical productivity tools where sensitive data is processed and stored. To ensure the integrity of the data, it is essential that they use full drive hardware encryption with pre-boot authentication (PBA).

data_sheet_pcs
data sheet

Secure Your 2230 Devices

2230 is an emerging standard for device manufactures storage configurations including Microsoft Surface, DellLatitude, and HP EliteBooks. Cigent is unique providing secure storage capabilities for 2230 including NSA-validated PBA.

data_sheet_2230
data sheet

Protect Your 2280 Storage

2280 is the established standard for storage on PCs. Cigent Secure Drive 2280 provides unparalleled data security with foundational full drive encryption and PBA coupled with patented features that ensures your sensitive data remains secure no matter the mission.

data_sheet_2280
Resources / Blog
More from Cigent
4 min read

Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge

Discover best practices for protecting sensitive data at the edge with Cigent's insights ..

4 min read

Prevent Data Security Issues with Disk Cloning & Data Destruction

Explore how disk cloning and data destruction can prevent security issues. Learn how to ..

Blog 4 min read

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules

Learn about FIPS 140-2 and FISMA compliance for cryptography modules, essential for ..

Frequently Asked Questions

Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.

Why is it important to protect data on PCs?

PCs are the primary user productivity devices. They continue to ingest, process and store information that may include sensitive and classified data. Many PCs operate in insecure environments where an adversary may gain physical access to the device. Without adequate protection adversaries can extract, modify, encrypt or destroy data. Attacks such as wiping and cloning only take seconds to execute. An adversary with longer access can employ advanced data recovery that includes a variety of techniques to defeat different endpoint protections.

Why do I need hardware encryptions vs relying on software encryption?

Protecting sensitive data from advanced threat actors requires layers of protection. Software encryption provides a basic level of protection but can be defeated using a variety of techniques and technologies. This is why the NSA, DISA, NIAP and other leading experts require full drive hardware encryption to meet standards including CSfC for data at rest and FIPS 140-2. Ideally organizations use a combination of software and hardware encryption with pre boot authentication and multifactor authentication providing layers of protection that can defeat the most sophisticated threat actors.

What types of drives does Cigent Offer?

Cigent offers secure storage on M.2 2280 SSD which is the legacy standard for storage in PCs. The emerging configuration in PCs is M.2 2230 SSD which is the standard on all Microsoft Surface Devices and many of the newest Dell Latitude and Precision PCs and HP Elite Books and HP Workstations.

Does Cigent address certifications?

Yes, Cigent Secure Storage Solutions can support organizations meeting Commercial Solutions for Classified (CSfC) for data at rest including pre-boot authentication requirements. Cigent solutions can also meet FIPS 140-2 and 140-3 standards. Additionally, Cigent can address requirements from Executive Order 14028 including encryption of data at rest, multi-factor authentication, and the utilization of zero-trust access control. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).

What is cloning and wiping?

Cloning and wiping are common attacks where an adversary will copy or “clone” a drive and/ or erase or “wipe” a drive. Clone and wipe attacks can take place when a device is at rest or in use. When a device is in use an adversary with physical access can execute an attack in only a few seconds. Cigent prevents cloning and wiping by locking all data ranges. Utilizing hidden partitions data remains protected even when a device is unlocked.

Still have questions?

Learn more about Cigent and our solutions by downloading our company overview.

Card

Cigent’s Federal Data Protection Solutions are second to none

Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.