.png?width=1440&height=640&name=Hero%20(1).png)
PCs
Protect Data at Rest on PCs
Layered protection for data at rest to achieve CSfC for DAR requirements with solutions accessible directly from leading PC manufacturers.
Benefits
Protect Data at Rest
PCs are the critical productivity tools. Emerging Artificial Intelligence capabilities will increase their utility and increase risk as more sensitive data is stored and processed at the edge. Layered protection are necessary to prevent unauthorized access to sensitive data.
Hardware Full Drive Encryption
AES 256-bit hardware encryption is validated by NIAP with multiple drives listed on NSA CSfC for DAR component list. With PBA, provides the outer layer of CSfC for DAR compliance requirements.
Pre-boot Authentication (PBA)
PBA provides a separate, secure authentication prior to initiating boot. Validated by NIAP and listed on NSA CSfC for DAR component list. With hardware FDE provides the outer layer of CSfC for DAR compliance.
Software Full Drive Encryption
Full-drive AES 256-bit software full -drive encryption validated by NIAP. Undergoing CSfC certification. Includes MFA providing the inner layer of CSfC for DAR compliance requirements.
.png?width=560&height=479&name=Untitled%20design%20(35).png)

CSfC DAR Component List
Cigent provides SSDs and software to meet NSA CSfC for DAR compliance with capabilities that address outer and inner layer requirements.

Enterprise Administration
Cigent Command Line Interface tool seamlessly connects within existing enterprise management providing administration at scale for Linux and Windows.

Data Sanitization
Data is erased using crypto and block erasure methods. Execution can be initiated locally, remotely, or with automated rules-based policy. Additionally patented firmware verification ensures all data is destroyed.

Simplify Procurement
Cigent and its SSD partner, Digistor, partner with leading PC OEMs including Dell, HP, Getac, and Panasonic. Complete CSfC validated solutions are available directly with your PC.

SSD Portfolio
Cigent offer multiple SSD options that are in process of NIAP SSD validation for inclusion on CSfC for DAR component list. Cigent also partners with Digistor rigorously testing Cigent PBA and FDE with their portfolio of SSDs.
Cigent SSD portfolio for PCs include:
M.2 2230
Available with 256GB, 512GB, 1TB capacity
M.2 2280
Available with 256GB, 512GB, 1TB, 2TB capacity
The Cigent Advantage
Cigent solutions were designed and developed with and for US Intelligence and Defense communities. All employees, including Cigent software development, are based in the US. The team includes multiple personnel with TS/SCI clearance with decades of data protection and operational experience to support your requirements.
Cigent solutions have been tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK) and are deployed across US Intelligence agencies, US Defense services, and the defense industrial base.
.png?width=560&height=540&name=Rectangle%203(2).png)
data sheet
Learn About PC Security
PCs are critical productivity tools where sensitive data is processed and stored. To ensure the integrity of the data, it is essential that they use full drive hardware encryption with pre-boot authentication (PBA).

data sheet
Secure Your 2230 Devices
2230 is an emerging standard for device manufactures storage configurations including Microsoft Surface, DellLatitude, and HP EliteBooks. Cigent is unique providing secure storage capabilities for 2230 including NSA-validated PBA.

data sheet
Protect Your 2280 Storage
2280 is the established standard for storage on PCs. Cigent Secure Drive 2280 provides unparalleled data security with foundational full drive encryption and PBA coupled with patented features that ensures your sensitive data remains secure no matter the mission.


Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge
Discover best practices for protecting sensitive data at the edge with Cigent's insights ..

Prevent Data Security Issues with Disk Cloning & Data Destruction
Explore how disk cloning and data destruction can prevent security issues. Learn how to ..

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules
Learn about FIPS 140-2 and FISMA compliance for cryptography modules, essential for ..
Frequently Asked Questions
Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.
PCs are the primary user productivity devices. They continue to ingest, process and store information that may include sensitive and classified data. Many PCs operate in insecure environments where an adversary may gain physical access to the device. Without adequate protection adversaries can extract, modify, encrypt or destroy data. Attacks such as wiping and cloning only take seconds to execute. An adversary with longer access can employ advanced data recovery that includes a variety of techniques to defeat different endpoint protections.
Protecting sensitive data from advanced threat actors requires layers of protection. Software encryption provides a basic level of protection but can be defeated using a variety of techniques and technologies. This is why the NSA, DISA, NIAP and other leading experts require full drive hardware encryption to meet standards including CSfC for data at rest and FIPS 140-2. Ideally organizations use a combination of software and hardware encryption with pre boot authentication and multifactor authentication providing layers of protection that can defeat the most sophisticated threat actors.
Cigent offers secure storage on M.2 2280 SSD which is the legacy standard for storage in PCs. The emerging configuration in PCs is M.2 2230 SSD which is the standard on all Microsoft Surface Devices and many of the newest Dell Latitude and Precision PCs and HP Elite Books and HP Workstations.
Yes, Cigent Secure Storage Solutions can support organizations meeting Commercial Solutions for Classified (CSfC) for data at rest including pre-boot authentication requirements. Cigent solutions can also meet FIPS 140-2 and 140-3 standards. Additionally, Cigent can address requirements from Executive Order 14028 including encryption of data at rest, multi-factor authentication, and the utilization of zero-trust access control. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).
Cloning and wiping are common attacks where an adversary will copy or “clone” a drive and/ or erase or “wipe” a drive. Clone and wipe attacks can take place when a device is at rest or in use. When a device is in use an adversary with physical access can execute an attack in only a few seconds. Cigent prevents cloning and wiping by locking all data ranges. Utilizing hidden partitions data remains protected even when a device is unlocked.
Still have questions?
Learn more about Cigent and our solutions by downloading our company overview.

Cigent’s Federal Data Protection Solutions are second to none
Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.