Cigent’s mission is protecting your data. With layered data-at-rest protection, patented security capabilities, and decades of operational experience Cigent is your partner to ensure mission data integrity.
Anzena Systems is an authorized reseller for Cigent's products and services.
The Cigent Advantage
Cigent solutions were designed and developed with and for US Intelligence and Defense communities. All employees, including Cigent software development, are based in the US. The team includes multiple personnel with TS/SCI clearance with decades of data protection and operational experience to support your requirements.
Cigent solutions have been tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK) and are deployed across US Intelligence agencies, US Defense services, and the defense industrial base.
Layered Protection for Data at Rest
Data at rest on edge devices is vulnerable to unauthorized access potentially revealing critical sensitive data. NSA's Commercial Solutions for Classified (CSfC) program sets stringent requirements requiring layered protections. Cigent provides SSDs and software to ensure data at rest is protected and enables organization to meet CSfC DAR requirements.
Proven Solution
Cigent provides hardware and software capabilities to protect data at rest and meet CSfC DAR compliance requirements. The joint solution has been rigorously tested and validated by NSA and NIAP and other certifying organizations. Alternatively, you can also utilize SSDs through our strategic partner, Digistor, which has undergone rigorous testing and joint development.
Enterprise Management
Cigent utilizes a Command Line Interface (CLI) tool that seamlessly integrates within existing management to provide enterprise administration. CLI operates with both Linux and Windows environments.
Data Sanitization
Cigent utilized and crypto and block erase to sanitize data. In addition, Cigent provides a patented verification that confirms at firmware level that each data block has been erased. This is the only way to ensure all data has been successfully destroyed.
Streamline Acquisition
Cigent SSDs and Software are available directly from leading device manufacturers directly within their configuration process simplifying acquisition process. Device OEM partnerships include Dell, HP, GETAC, and Panasonic.
Advanced Adversary Protection
Advanced data recovery techniques, including quantum computing, can overcome or circumvent standard protection.
The Threat is Real
Advanced data recovery tools and methodologies have proliferated. These include clone and wiping, alternative OS boot, employing Hex Readers, and even employing electron microscope to find keys.
And the risk of quantum computing is emerging. Quantum computing’s speed and ability factor large integers will inevitably significantly disrupt current crypto protection methodologies. Adversaries are already collecting encrypted data in the expectation that they will be able to gain access as quantum becomes available.
Cigent was designed and developed by a leading expert in data exfiltration. Leveraging decades of operational experience Cigent security was developed for and with top Federal agencies to prevent unauthorized data access from advanced adversaries .
Multiple Encryption Layers
Cigent provides hardware, software, and file encryption using independent cryptography validated by NIAP and NSA. Each of these layers provides independent protection requiring adversary to circumvent all three layers.
Pre-boot Authentication
PBA is an essential element to ensure the efficacy of full drive encryption. PBA provides a secure environment to authentication drive prior to OS boot. Without PBA adversaries can intercept OS and gain access to encryption keys.
Secure Partitions
Ability to create separate locked partitions where data is locked and unreadable at the sector level. Drives can be enable to remain locked even when device is in use with access through step-up authentication Adversary would be unable to even locate drives existence protecting data from clone & wiping or future quantum attacks.
Verified Data Sanitization
Data sanitization ensures adversaries are unable to gain access to data. Block erasure, while effective, frequently does not erase all data. Cigent provides patented firmware capability to verify data has been erased ensuring adversary cannot recovery data.
Cigent ensures data has been destroyed with crypto and block erasure and a patented firmware verified data erasure.
Verify Data is Destroyed
Eradicating data ensures adversary never gains access. The emerging threat of quantum computing increases the importance of proper data sanitization.
The standard for SSD sanitization is crypto and block erasure. However, these approaches do not ensure that all data is destroyed. Recognizing this risk, the NSA issued Manual 9-12 providing specific, detailed guidance for the physical destruction of drives to prevent data recovery.
Cigent provides a patented alternative with firmware level block-by-block analysis verifying that all data is erased. Combined with the capability to execute with local, remote, or rules-based commands, Cigent verified data erasure provides full-proof data sanitization capabilities.
Crypto Erasure
Crypto erase destroys the encryption key required to access encrypted data. The encrypted data remains on the storage device but is effectively impossible to decrypt. Crypto erase executes in milliseconds making it ideal in emergencies.
Block Erasure
Block erasure erases solid-state drives (SSDs) by using the drive's internal functions to electrically erase each block. Block erasure delivers the permanent elimination of data on an SSD.
Verified Data Erasure
Patented firmware capability provides block-by-block analysis of drive to ensure all data has been permanently erased. Policy can continue to erase data until confirmation that all data has been destroyed.
Local or Remote Execution
Cigent provides the option of initiating execution commands locally or remotely. Cigent provides enterprise management console deployed locally or in the cloud and a Command Line Interface (CLI) to execute erasure.
Cigent employs layered protection to mitigate risks from malicious insiders controlling access and documenting activities.
Secure Data Access
Mitigating risks from trusted insiders is one of the most challenging elements of data security. Controls cannot inhibit operational efficacy but essential to segment data, control access, and track data access.
Segmented Drives
Drives can be partitioned allowing for granular data access controls. Cigent SSDs can be partitioned into eight separate drives each with its own access controls. Invaluable on shared devices with multiple users and data types.
File-level Encryption
File level encryption sustains encryption protection if data is removed from the device. The approach prevents an insider from exfiltrating data in clear text.
Secure Data Access Logs
Document immutable records for all data activity. These tamper-proof records can be examined for potential malicious activities and used in forensic investigations.
Data Analysis
Data access logs, including file-level encryption reports, can be uploaded to the enterprise management software or SIEM for reporting and analysis to identify potential malicious behavior.
Cigent Software Full Drive Encryption (SW FDE) secures mission-critical data providing NSA CSfC for DAR inner-layer protection.
NSA Validated DAR Protection
NSA Validated DAR ProtectionCigent SW FDE employs quantum-resistant AES 256-bit encryption validated by NIAP and NSA to protect data at rest. Cigent SW FDE can complement HW FDE to meet CSfC for DAR requirements or utilize as stand-alone encryption delivering foundational protection.
Protect Data at Rest on PCs.
Layered protection for data at rest to achieve CSfC for DAR requirements with solutions accessible directly from leading PC manufacturers.
PCs are the critical productivity tools. Emerging Artificial Intelligence capabilities will increase their utility and increase risk as more sensitive data is stored and processed at the edge. Layered protection are necessary to prevent unauthorized access to sensitive data.
Hardware Full Drive Encryption
AES 256-bit hardware encryption is validated by NIAP with multiple drives listed on NSA CSfC for DAR component list. With PBA, provides the outer layer of CSfC for DAR compliance requirements.
Pre-boot Authentication (PBA)
PBA provides a separate, secure authentication prior to initiating boot. Validated by NIAP and listed on NSA CSfC for DAR component list. With hardware FDE provides the outer layer of CSfC for DAR compliance.
Software Full Drive Encryption
Full-drive AES 256-bit software full -drive encryption validated by NIAP. Undergoing CSfC certification. Includes MFA providing the inner layer of CSfC for DAR compliance requirements.
NSA Validated DAR ProtectionCigent SW FDE employs quantum-resistant AES 256-bit encryption validated by NIAP and NSA to protect data at rest. Cigent SW FDE can complement HW FDE to meet CSfC for DAR requirements or utilize as stand-alone encryption delivering foundational protection.
Protect Workstations and Servers
Layered protection for enterprise storage devices operating at the edge.
Protect Enterprise Data at Rest
Mission-requirements have increased the need for enterprise computing capable of processing and storing large amounts of data at the edge. Workstations and servers have become smaller and mobile increasing the risk of theft or loss. Layered protection is necessary to prevent unauthorized access to sensitive data.
Hardware Full Drive Encryption
AES 256-bit hardware encryption is validated by NIAP with multiple drives listed on NSA CSfC for DAR component list. With PBA provides the outer layer of CSfC for DAR compliance requirements.
Pre-boot Authentication (PBA)
PBA provides a separate, secure authentication prior to initiating boot. Validated by NIAP and listed on NSA CSfC for DAR component list. With hardware FDE provides the outer layer of CSfC for DAR compliance.
Software Full Drive Encryption
Full-drive AES 256-bit software full -drive encryption validated by NIAP. Undergoing CSfC certification. Includes MFA providing the inner layer of CSfC for DAR compliance requirements.
Data Protection Solutions for Unmanned Vehicles
UxV store and collect sensitive and classified data. Their mission parameters guarantee many will be recovered by adversaries. Unauthorized access to UxV data will have significant consequences. Adversary may gain unauthorized access to algorithms compromising UxV efficacy and access sensitive mission information including location, tactics, targets, and capability data.
Cigent protects data on UxV with layered security features that prevent unauthorized data access.
Unauthorized access to UxV data will have significant consequences
Adversary accessing UxV algorithms can:
Protecting Data on Industrial Control Systems
Industrial Control Systems (ICS) capabilities are advancing rapidly optimizing efficiency and reducing or eliminating manual tasks. Subsequently ICS is collecting, processing, and warehousing increasing volumes of data that may be sensitive and or classified and needs to be protected.
Protect Data at Rest
Cigent provides a portfolio of Secure Storage Solutions for Industrial Control Systems. With integrated hardware and software capabilities they deliver layered protection to secure data at rest and throughout its lifecycle. Cigent solutions have been tested and validated by leading Federal agencies including NSA, NIST, DISA, and NIAP.
We would love to help you better connect, protect, and thrive in an AI-driven world.
101 Jefferson Dr Ste 227B, Menlo Park, California 94025, United States
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.