.png?width=1920&height=1080&name=ompare%20product%20performance%20globally%2c%20identify%20competitive%20opportunities%2c%20and%20make%20informed%20leadership%20decisions.%20(1).png)
Servers
Protect Workstations and Servers
Layered protection for enterprise storage devices operating at the edge.
Benefits
Protect Enterprise Data at Rest
Mission-requirements have increased the need for enterprise computing capable of processing and storing large amounts of data at the edge. Workstations and servers have become smaller and mobile increasing the risk of theft or loss. Layered protection is necessary to prevent unauthorized access to sensitive data.
Hardware Full Drive Encryption
AES 256-bit hardware encryption is validated by NIAP with multiple drives listed on NSA CSfC for DAR component list. With PBA provides the outer layer of CSfC for DAR compliance requirements.
Pre-boot Authentication (PBA)
PBA provides a separate, secure authentication prior to initiating boot. Validated by NIAP and listed on NSA CSfC for DAR component list. With hardware FDE provides the outer layer of CSfC for DAR compliance.
Software Full Drive Encryption
Full-drive AES 256-bit software full -drive encryption validated by NIAP. Undergoing CSfC certification. Includes MFA providing the inner layer of CSfC for DAR compliance requirements.

Multi-Drive Support
RAID combines multiple physical hard drives into a single logical unit to improve performance, and data redundancyCigent SSDs and PBA have been developed and tested to protect data in a RAID configuration.
Protect Data at Rest

CSfC DAR Component List
Cigent provides SSDs and software to meet NSA CSfC for DAR compliance with capabilities that address outer and inner layer requirements.

Enterprise Administration
Cigent Command Line Interface tool seamlessly connects within existing enterprise management providing administration at scale for Linux and Windows.

Data Sanitization
Data is erased using crypto and block erasure methods. Execution can be initiated locally, remotely, or with automated rules-based policy.

Simplify Procurement
Cigent and its SSD partner, Digistor, partner with leading Server and Workstation OEMs including Dell and HP. Complete CSfC validated solutions are available directly with your Server or Workstation.

SSD Portfolio
Cigent provides multiple SSDs that are in process of NIAP SSD validation for inclusion on CSfC for DAR component list. Cigent also partners with Digistor rigorously testing Cigent PBA and FDE with their portfolio of SSDs.
Cigent SSD portfolio for PCs include:
U.2
Available with 1.92TB, 3.84TB, 7.68TB, 15.36TB capacity
M.2 2280 SSD Boot Drive
A boot drive contains the files needed to start the operating system (OS) or firmware. Available with 256GB, 512GB, 1TB, 2TB capacity
The Cigent Advantage
Cigent solutions were designed and developed with and for US Intelligence and Defense communities. All employees, including Cigent software development, are based in the US. The team includes multiple personnel with TS/SCI clearance with decades of data protection and operational experience to support your requirements.Cigent solutions have been tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK) and are deployed across US Intelligence agencies, US Defense services, and the defense industrial base.
.png?width=560&height=540&name=Rectangle%203(2).png)
datasheet
Optimize Your Enterprise Storage
Edge computing requirements are increasing the utilization of servers outside of secured data centers.


Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge
Discover best practices for protecting sensitive data at the edge with Cigent's insights ..

Prevent Data Security Issues with Disk Cloning & Data Destruction
Explore how disk cloning and data destruction can prevent security issues. Learn how to ..

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules
Learn about FIPS 140-2 and FISMA compliance for cryptography modules, essential for ..
Frequently Asked Questions
Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.
Servers have become more compact and more flexible resulting in an increasing number deployed outside of traditional data centers. Remotely deployed servers are at risk of loss or theft potentially exposing the significant data that resides on them. Protection of data on servers requires the same protection for data as PCs including full drive encryption utilizing pre boot authentication.
Protecting sensitive data from advanced threat actors requires layers of protection. Software encryption provides a basic level of protection but can be defeated using a variety of techniques and technologies. This is why the NSA, DISA, NIAP and other leading experts require full drive hardware encryption to meet standards including CSfC for data at rest and FIPS 140-2. Ideally organizations use a combination of software and hardware encryption with pre boot authentication and multifactor authentication providing layers of protection that can defeat the most sophisticated threat actors.
Cigent offers secure storage on U.2 SSD which is the standard storage for workstations and remote servers. The U.2 SSD provides AES 256 full drive encryption that has been validated by leading Federal agencies including NIST, NSA, and NIAP.
Cloning and wiping are common attacks where an adversary will copy or “clone” a drive and/ or erase or “wipe” a drive. Clone and wipe attacks can take place when a device is at rest or in use. When a device is in use an adversary with physical access can execute an attack in only a few seconds. Cigent prevents cloning and wiping by locking all data ranges. Utilizing hidden partitions data remains protected even when a device is unlocked.
Still have questions?
Learn more about Cigent and our solutions by downloading our company overview.

Cigent’s Federal Data Protection Solutions are second to none
Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.