Anzena
Anzena
  • Home
  • Product Lines
    • Bitdefender
    • Cigent
    • Cisco
    • Cisco Duo
    • Cisco Splunk
    • Fortinet
    • HPE
    • Okta
    • Secturion Systems
    • TD SYNNEX
  • Services
  • Partners
  • Company
    • About Us
    • FAQs
    • Contact Us
  • More
    • Home
    • Product Lines
      • Bitdefender
      • Cigent
      • Cisco
      • Cisco Duo
      • Cisco Splunk
      • Fortinet
      • HPE
      • Okta
      • Secturion Systems
      • TD SYNNEX
    • Services
    • Partners
    • Company
      • About Us
      • FAQs
      • Contact Us
  • Home
  • Product Lines
    • Bitdefender
    • Cigent
    • Cisco
    • Cisco Duo
    • Cisco Splunk
    • Fortinet
    • HPE
    • Okta
    • Secturion Systems
    • TD SYNNEX
  • Services
  • Partners
  • Company
    • About Us
    • FAQs
    • Contact Us

Cigent

Protecting Your Data

Cigent’s mission is protecting your data. With layered data-at-rest protection, patented security capabilities, and decades of operational experience Cigent is your partner to ensure mission data integrity. 


Anzena Systems is an authorized reseller for Cigent's products and services. 

 

The Cigent Advantage

Cigent solutions were designed and developed with and for US Intelligence and Defense communities. All employees, including Cigent software development, are based in the US. The team includes multiple personnel with TS/SCI clearance with decades of data protection and operational experience to support your requirements.

Cigent solutions have been tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK) and are deployed across US Intelligence agencies, US Defense services, and the defense industrial base.

Data at Rest Protection

 Layered Protection for Data at Rest

 Data at rest on edge devices is vulnerable to unauthorized access potentially revealing critical sensitive data. NSA's Commercial Solutions for Classified (CSfC) program sets stringent requirements requiring layered protections. Cigent provides SSDs and software to ensure data at rest is protected and enables organization to meet CSfC DAR requirements.

 

Proven Solution

Cigent provides hardware and software capabilities to protect data at rest and meet CSfC DAR compliance requirements. The joint solution has been rigorously tested and validated by NSA and NIAP and other certifying organizations. Alternatively, you can also utilize SSDs through our strategic partner, Digistor, which has undergone rigorous testing and joint development.

 

Enterprise Management

Cigent utilizes a Command Line Interface (CLI) tool that seamlessly integrates within existing management to provide enterprise administration. CLI operates with both Linux and Windows environments.


Data Sanitization

Cigent utilized and crypto and block erase to sanitize data. In addition, Cigent provides a patented verification that confirms at firmware level that each data block has been erased. This is the only way to ensure all data has been successfully destroyed. 


Streamline Acquisition

Cigent SSDs and Software are available directly from leading device manufacturers directly within their configuration process simplifying acquisition process. Device OEM partnerships include Dell, HP, GETAC, and Panasonic.

Quantum & Advanced Threat Protection

Advanced Adversary Protection

 Advanced data recovery techniques, including quantum computing, can overcome or circumvent standard protection. 

 

The Threat is Real

Advanced data recovery tools and methodologies have proliferated. These include clone and wiping, alternative OS boot, employing Hex Readers, and even employing electron microscope to find keys.

And the risk of quantum computing is emerging. Quantum computing’s speed and ability factor large integers will inevitably significantly disrupt current crypto protection methodologies. Adversaries are already collecting encrypted data in the expectation that they will be able to gain access as quantum becomes available. 

Cigent Protection

  Cigent was designed and developed by a leading expert in data exfiltration. Leveraging decades of operational experience Cigent security was developed for and with top Federal agencies to prevent unauthorized data access from advanced adversaries .

 

Multiple Encryption Layers

Cigent provides hardware, software, and file encryption using independent cryptography validated by NIAP and NSA. Each of these layers provides independent protection requiring adversary to circumvent all three layers.

 

Pre-boot Authentication

PBA is an essential element to ensure the efficacy of full drive encryption. PBA provides a secure environment to authentication drive prior to OS boot. Without PBA adversaries can intercept OS and gain access to encryption keys.

 

Secure Partitions

Ability to create separate locked partitions where data is locked and unreadable at the sector level. Drives can be enable to remain locked even when device is in use with access through step-up authentication Adversary would be unable to even locate drives existence protecting data from clone & wiping or future quantum attacks.

 

Verified Data Sanitization

Data sanitization ensures adversaries are unable to gain access to data. Block erasure, while effective, frequently does not erase all data. Cigent provides patented firmware capability to verify data has been erased ensuring adversary cannot recovery data.


Verified Data Sanitization

 Cigent ensures data has been destroyed with crypto and block erasure and a patented firmware verified data erasure.  


Verify Data is Destroyed

Eradicating data ensures adversary never gains access. The emerging threat of quantum computing increases the importance of proper data sanitization.

The standard for SSD sanitization is crypto and block erasure. However, these approaches do not ensure that all data is destroyed. Recognizing this risk, the NSA issued Manual 9-12 providing specific, detailed guidance for the physical destruction of drives to prevent data recovery.

Cigent provides a patented alternative with firmware level block-by-block analysis verifying that all data is erased. Combined with the capability to execute with local, remote, or rules-based commands, Cigent verified data erasure provides full-proof data sanitization capabilities. 

 

Crypto Erasure

Crypto erase destroys the encryption key required to access encrypted data. The encrypted data remains on the storage device but is effectively impossible to decrypt. Crypto erase executes in milliseconds making it ideal in emergencies.

 

Block Erasure

Block erasure erases solid-state drives (SSDs) by using the drive's internal functions to electrically erase each block. Block erasure delivers the permanent elimination of data on an SSD.

 

Verified Data Erasure

Patented firmware capability provides block-by-block analysis of drive to ensure all data has been permanently erased. Policy can continue to erase data until confirmation that all data has been destroyed.

 

Local or Remote Execution

Cigent provides the option of initiating execution commands locally or remotely. Cigent provides enterprise management console deployed locally or in the cloud and a Command Line Interface (CLI) to execute erasure.

Data Access Control

  Cigent employs layered protection to mitigate risks from malicious insiders controlling access and documenting activities. 


Secure Data Access

Mitigating risks from trusted insiders is one of the most challenging elements of data security. Controls cannot inhibit operational efficacy but essential to segment data, control access, and track data access. 

 

Segmented Drives

Drives can be partitioned allowing for granular data access controls. Cigent SSDs can be partitioned into eight separate drives each with its own access controls. Invaluable on shared devices with multiple users and data types.

 

File-level Encryption

File level encryption sustains encryption protection if data is removed from the device. The approach prevents an insider from exfiltrating data in clear text.

 

Secure Data Access Logs

Document immutable records for all data activity. These tamper-proof records can be examined for potential malicious activities and used in forensic investigations.

 

Data Analysis

Data access logs, including file-level encryption reports, can be uploaded to the enterprise management software or SIEM for reporting and analysis to identify potential malicious behavior.

Featured Product: Pre-boot Authentication

  Cigent PBA is specifically designed to meet stringent federal security mandates, ensuring comprehensive protection for classified and sensitive information against unauthorized access and potential breaches. 

Featured Product: Software Full Drive Encryption

   Cigent Software Full Drive Encryption (SW FDE) secures mission-critical data providing NSA CSfC for DAR inner-layer protection.  

 

NSA Validated DAR Protection

NSA Validated DAR ProtectionCigent SW FDE employs quantum-resistant AES 256-bit encryption validated by NIAP and NSA to protect data at rest. Cigent SW FDE can complement HW FDE to meet CSfC for DAR requirements or utilize as stand-alone encryption delivering foundational protection. 

Featured Product: SSD Clients - Protect Data at Rest on PCs

    Protect Data at Rest on PCs.  

 Layered protection for data at rest to achieve CSfC for DAR requirements with solutions accessible directly from leading PC manufacturers. 

 

PCs are the critical productivity tools. Emerging Artificial Intelligence capabilities will increase their utility and increase risk as more sensitive data is stored and processed at the edge. Layered protection are necessary to prevent unauthorized access to sensitive data.


Hardware Full Drive Encryption

AES 256-bit hardware encryption is validated by NIAP with multiple drives listed on NSA CSfC for DAR component list. With PBA, provides the outer layer of CSfC for DAR compliance requirements.


Pre-boot Authentication (PBA)

PBA provides a separate, secure authentication prior to initiating boot. Validated by NIAP and listed on NSA CSfC for DAR component list. With hardware FDE provides the outer layer of CSfC for DAR compliance.


Software Full Drive Encryption

Full-drive AES 256-bit software full -drive encryption validated by NIAP. Undergoing CSfC certification. Includes MFA providing the inner layer of CSfC for DAR compliance requirements.

NSA Validated DAR ProtectionCigent SW FDE employs quantum-resistant AES 256-bit encryption validated by NIAP and NSA to protect data at rest. Cigent SW FDE can complement HW FDE to meet CSfC for DAR requirements or utilize as stand-alone encryption delivering foundational protection. 

Featured Product: SSD Enterprise - Protect Workstations and Servers

     Protect Workstations and Servers  

  Layered protection for enterprise storage devices operating at the edge. 


Protect Enterprise Data at Rest

Mission-requirements have increased the need for enterprise computing capable of processing and storing large amounts of data at the edge. Workstations and servers have become smaller and mobile increasing the risk of theft or loss. Layered protection is necessary to prevent unauthorized access to sensitive data.


Hardware Full Drive Encryption

AES 256-bit hardware encryption is validated by NIAP with multiple drives listed on NSA CSfC for DAR component list. With PBA provides the outer layer of CSfC for DAR compliance requirements.


Pre-boot Authentication (PBA)

PBA provides a separate, secure authentication prior to initiating boot. Validated by NIAP and listed on NSA CSfC for DAR component list. With hardware FDE provides the outer layer of CSfC for DAR compliance.


Software Full Drive Encryption

Full-drive AES 256-bit software full -drive encryption validated by NIAP. Undergoing CSfC certification. Includes MFA providing the inner layer of CSfC for DAR compliance requirements.

Featured Product: SSD UxV - Data Protection Solutions for Unmanned Vehicles

      Data Protection Solutions for Unmanned Vehicles 

   UxV store and collect sensitive and classified data. Their mission parameters guarantee many will be recovered by adversaries. Unauthorized access to UxV data will have significant consequences. Adversary may gain unauthorized access to algorithms compromising UxV efficacy and access sensitive mission information including location, tactics, targets, and capability data.

Cigent protects data on UxV with layered security features that prevent unauthorized data access. 

 

Unauthorized access to UxV data will have significant consequences

Adversary accessing UxV algorithms can:

  • Gain insight into ATR (Automated Target Recognition) criteria. Utilize to modify configurations undermining UxV efficacy.
  • Compromise the efficacy of swarms with automated reactions. Utilize algorithms to understand and develop countermeasures.
  • Degrade the effectiveness of PNT (Position, Navigation, and Timing) algorithms used to map the terrain in GPS-denied environments.

Featured Product: SSD ICS - Protecting Data on Industrial Control Systems

       Protecting Data on Industrial Control Systems

    Industrial Control Systems (ICS) capabilities are advancing rapidly optimizing efficiency and reducing or eliminating manual tasks. Subsequently ICS is collecting, processing, and warehousing increasing volumes of data that may be sensitive and or classified and needs to be protected.
 

Protect Data at Rest

Cigent provides a portfolio of Secure Storage Solutions for Industrial Control Systems. With integrated hardware and software capabilities they deliver layered protection to secure data at rest and throughout its lifecycle. Cigent solutions have been tested and validated by leading Federal agencies including NSA, NIST, DISA, and NIAP.

Request for Information or Quote

Let us know how we can help you. Drop us a line!

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

"Secure Everything Always. Simply."

We would love to help you better connect, protect, and thrive in an AI-driven world. 

Anzena Systems LLC

101 Jefferson Dr Ste 227B, Menlo Park, California 94025, United States

Featured Products

Copyright © 2025 Anzena Systems LLC.  All Rights Reserved.  

Anzena Systems and the Anzena Systems Logo are trademarks or registered trademarks of Anzena Systems LLC.  Other names and marks are the property of their respectiove owners.

Powered by

  • Contact Us
  • Website Use Terms
  • Terms & Conditions Sale

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept