How We Help
DAR Protection
Quantum & Advanced Threat Protection
Data Sanitization
Insider Threat Protection
Capabilities
Products
Preboot
Cigent PBA
Prevent Data Attack
Cigent FDE
Prevent Ransomware & All Other Attacks - Cobalt Blue 1(1)
Cigent SSD Clients
Frame 84
Cigent SSD Enterprise
Frame 87(1)
Cigent SSD UxV
Industrial Control Systems
Cigent SSD ICS
Hex Editor
Custom Projects
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Blog
Read articles on all things cyber security.
Who we partner with
Handshake
Partners
Cigent Ecosystem of Device and Service Partners
compatible sed devices
Certified Drives
SED Devices Compatible with Cigent
Learn More About Cigent
News from Cigent
4 min read
Discover best practices for protecting sensitive ..
4 min read
Explore how disk cloning and data destruction can ..
Menu Close
ompare product performance globally, identify competitive opportunities, and make informed leadership decisions. (1)
Servers

Protect Workstations and Servers

Layered protection for enterprise storage devices operating at the edge.

Benefits

Protect Enterprise Data at Rest

Mission-requirements have increased the need for enterprise computing capable of processing and storing large amounts of data at the edge. Workstations and servers have become smaller and mobile increasing the risk of theft or loss. Layered protection is necessary to prevent unauthorized access to sensitive data.

Hardware Full Drive Encryption

AES 256-bit hardware encryption is validated by NIAP with multiple drives listed on NSA CSfC for DAR component list. With PBA provides the outer layer of CSfC for DAR compliance requirements.

Pre-boot Authentication (PBA)

PBA provides a separate, secure authentication prior to initiating boot. Validated by NIAP and listed on NSA CSfC for DAR component list. With hardware FDE provides the outer layer of CSfC for DAR compliance.

Software Full Drive Encryption

Full-drive AES 256-bit software full -drive encryption validated by NIAP. Undergoing CSfC certification. Includes MFA providing the inner layer of CSfC for DAR compliance requirements.

external media

Multi-Drive Support

RAID combines multiple physical hard drives into a single logical unit to improve performance, and data redundancyCigent SSDs and PBA have been developed and tested to protect data in a RAID configuration.


Protect Data at Rest

Component List

CSfC DAR Component List

Cigent provides SSDs and software to meet NSA CSfC for DAR compliance with capabilities that address outer and inner layer requirements.

Efficient Administration

Enterprise Administration

Cigent Command Line Interface tool seamlessly connects within existing enterprise management providing administration at scale for Linux and Windows.

Block Erasure

Data Sanitization

Data is erased using crypto and block erasure methods. Execution can be initiated locally, remotely, or with automated rules-based policy.

Easy to Aquire

Simplify Procurement

Cigent and its SSD partner, Digistor, partner with leading Server and Workstation OEMs including Dell and HP. Complete CSfC validated solutions are available directly with your Server or Workstation.

Layout 1

SSD Portfolio

Cigent provides multiple SSDs that are in process of NIAP SSD validation for inclusion on CSfC for DAR component list. Cigent also partners with Digistor rigorously testing Cigent PBA and FDE with their portfolio of SSDs.

Cigent SSD portfolio for PCs include:

U.2

Available with 1.92TB, 3.84TB, 7.68TB, 15.36TB capacity

M.2 2280 SSD Boot Drive

A boot drive contains the files needed to start the operating system (OS) or firmware. Available with 256GB, 512GB, 1TB, 2TB capacity

The Cigent Advantage

Cigent solutions were designed and developed with and for US Intelligence and Defense communities. All employees, including Cigent software development, are based in the US. The team includes multiple personnel with TS/SCI clearance with decades of data protection and operational experience to support your requirements.Cigent solutions have been tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK) and are deployed across US Intelligence agencies, US Defense services, and the defense industrial base.

Rectangle 3(2)
datasheet

Optimize Your Enterprise Storage

Edge computing requirements are increasing the utilization of servers outside of secured data centers.

Cigent_cover enterprise storage data sheet
Resources / Blog
More from Cigent
4 min read

Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge

Discover best practices for protecting sensitive data at the edge with Cigent's insights ..

4 min read

Prevent Data Security Issues with Disk Cloning & Data Destruction

Explore how disk cloning and data destruction can prevent security issues. Learn how to ..

Blog 4 min read

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules

Learn about FIPS 140-2 and FISMA compliance for cryptography modules, essential for ..

Frequently Asked Questions

Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.

Why is it important to protect data on remote Servers?

Servers have become more compact and more flexible resulting in an increasing number deployed outside of traditional data centers. Remotely deployed servers are at risk of loss or theft potentially exposing the significant data that resides on them. Protection of data on servers requires the same protection for data as PCs including full drive encryption utilizing pre boot authentication.

Why do I need hardware encryptions vs relying on software encryption?

Protecting sensitive data from advanced threat actors requires layers of protection. Software encryption provides a basic level of protection but can be defeated using a variety of techniques and technologies. This is why the NSA, DISA, NIAP and other leading experts require full drive hardware encryption to meet standards including CSfC for data at rest and FIPS 140-2. Ideally organizations use a combination of software and hardware encryption with pre boot authentication and multifactor authentication providing layers of protection that can defeat the most sophisticated threat actors.

What types of drives does Cigent Offer?

Cigent offers secure storage on U.2 SSD which is the standard storage for workstations and remote servers. The U.2 SSD provides AES 256 full drive encryption that has been validated by leading Federal agencies including NIST, NSA, and NIAP.

What is cloning and wiping?

Cloning and wiping are common attacks where an adversary will copy or “clone” a drive and/ or erase or “wipe” a drive. Clone and wipe attacks can take place when a device is at rest or in use. When a device is in use an adversary with physical access can execute an attack in only a few seconds. Cigent prevents cloning and wiping by locking all data ranges. Utilizing hidden partitions data remains protected even when a device is unlocked.

Still have questions?

Learn more about Cigent and our solutions by downloading our company overview.

Card

Cigent’s Federal Data Protection Solutions are second to none

Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.