Citadel™ SSDs for Securing Data at Rest (DAR)

Citadel SSDs Keep Intruders Away

A built-in PBA unlocks access to the encrypted operating system or virtual machine on the Citadel SSD, as well as the data stored there. This secured data is encrypted by NSA-approved Advanced Encryption Standard (AES) 256-bit encryption at the hardware level. Once booted, Citadel allows no-overhead, hardware-speed access to encrypted data at the full performance of the system.

Data at Rest Security… Simplified

Citadel FIPS certified self-encrypting SSDs are the only SSDs to integrate multifactor authentication, pre-boot authentication (PBA), and hardware encryption into a complete, low cost solution.

Choose between Citadel K Series SSDs, powered by CipherDrive™, which enable CSfC solutions to be built for standard laptops, desktops, and tactical servers, or Citadel C Series SSDs, powered by Cigent®, which adopt a zero-trust architecture that securely stores commercial, financial, medical, and other sensitive data.

  • Military-Grade Data at Rest (DAR) Security
  • Authorization Acquisition (AA) and Encryption Engine (EE)
  • Adversaries cannot steal what they cannot see: unreadable storage partition protected by a non-recoverable key
  • TAA Compliant
  • FIPS 140-2 Level 2 for SSD and FIPS 140-2 for PBA
  • FIPS + Commercial Solutions for Classified (CSfC) versions available
  • Common Criteria (CC) Certified SSDs and PBAs
  • Build security solutions with standard laptops, desktops, and tactical servers

Citadel K Series SSDs

NIST Certification: #3926

CSfC DAR security solutions for DoD and government use can easily be built in to standard laptops, desktops, and tactical servers with Citadel K Series, powered by Cipherdrive®.

  • Constitutes a complete CSfC layer that’s perfect for DoD, Federal agency, and critical infrastructure to protect key data
  • Compatible with Windows, Linux, and hypervisors like SecureView and Forcepoint
  • Headless version available (Citadel K-GL)
  • Multi-drive support for tactical servers and other systems with multiple Citadel K Series SSDs: unlock one SSD to authorize access to all SSDs
  • CC Certified and NIAP Listed (VID #11297)

Citadel C Series SSDs

NIST Certification: #4294

Protect your data from cyber threats with Citadel C Series. C Series is built upon a Zero Trust architure and uses AI-based threat detection to dynamically lock down files.

  • Zero Trust architecture protects from ransomware and unauthorized access
    Verified device erasure (Advanced version only)
  • Immutable Insider Detection: secure data access logs capture all insider threat activity (Advanced version only)
  • Automated Threat Response: makes data invisible if Cigent Data Defense is disabled (Advanced version only)
  • Address data governance and privacy requirements (CMMC, HIPAA, GDPR, GLBA, PCI-DSS, and CCPA)
  • FIPS versions are CC Certified and NIAP Listed (VID #11297)

Easily Deployed Military-Grade Data at Rest Security

Integrated hardware solution  

  • Pre-boot locking (pre-boot authentication) 
  • Hardware AES 256-bit encryption engine 
  • No software required 
  • No software overhead 
  • Hardware speeds 

Compatible with your systems 

  • Windows, Linux, and hypervisors like SecureView and Forcepoint
  • NVMe and SATA interfaces 
  • M.2 and 2.5-inch form factors 
  • Suitable for commercial laptops and desktops 
  • Use computers from major OEMs, system builders 

Perfect for DoD, Federal agency, critical infrastructure, security-conscious organizations 

  • Address Federal requirements to secure DAR 
  • Build solutions with highest levels of security at commercial pricing and availability 
  • No need for expensive, specialized solutions 

Citadel Data Sheets:

Download our data sheets with more information on Citadel SSDs with pre-boot authentication.

White Paper:

Building a Citadel of Trust in a Zero Trust World

Your challenge is to secure and protect the Data at Rest under your control to the extent determined by its classification levels. You need to beware the increasing cyberattacks while limiting the attack surface. At the same time, to fulfill your mission, you have to manage cost and complexity while providing authorized users access to files and data across a multitude of platforms.

White Paper:

Is Your Data at Rest (DAR) Truly Secure?

If there’s anything we’ve learned over recent years, it’s that our computer systems in general — and the precious data stored on them in particular — are susceptible to attack by hackers. These bad actors can range from independent entities to nation states.