Citadel™ SSDs for Securing Data at Rest (DAR)
Citadel Pre-Boot Authentication (PBA) Keeps Intruders Away
A built-in PBA unlocks access to the encrypted operating system or virtual machine on the Citadel SSD, as well as the data stored there. This secured data is encrypted by NSA-approved Advanced Encryption Standard (AES) 256-bit encryption at the hardware level. Once booted, Citadel allows no-overhead, hardware-speed access to encrypted data at the full performance of the system.
Data at Rest Security… Simplified
Citadel FIPS certified self-encrypting SSDs are the only SSDs to integrate multifactor authentication, pre-boot authentication (PBA), and hardware encryption into a complete, low cost solution.
Choose between Citadel K Series SSDs, powered by CipherDrive™, which enable CSfC solutions to be built for standard laptops, desktops, and tactical servers, or Citadel C Series SSDs, powered by Cigent®, which adopt a zero-trust architecture that securely stores commercial, financial, medical, and other sensitive data.
- Military-Grade Data at Rest (DAR) Security
- Authorization Acquisition (AA) and Encryption Engine (EE)
- Adversaries cannot steal what they cannot see: unreadable storage partition protected by a non-recoverable key
- TAA Compliant
- FIPS 140-2 Level 2 for SSD and FIPS 140-2 for PBA
- Common Criteria (CC) pending SSDs and CC-certified PBAs
- Build security solutions with standard laptops, desktops, and tactical servers
Citadel K Series SSDs
NIST Certification: #3926
CSfC DAR security solutions for DoD and government use can easily be built in to standard laptops, desktops, and tactical servers with Citadel K Series, powered by Cipherdrive®.
- Enables affordable CSfC (Commercial Solutions for Classified) solutions perfect for DoD, Federal agency, and critical infrastructure to protect key data
- Compatible with Windows, Linux, hypervisors like SecureView, and Forcepoint
- Headless version available (Citadel K-GL)
- Multi-drive support for tactical servers and other systems with multiple Citadel K Series SSDs: unlock one SSD to authorize access to all SSDs
Citadel C Series SSDs
NIST Certification: #4294
Protect your data from cyber threats with Citadel C Series. C Series is built upon a Zero Trust architure and uses AI-based threat detection to dynamically lock down files.
- Zero Trust architecture protects from ransomware and unauthorized access
Verified device erasure (Advanced version only)
- Immutable Insider Detection: secure data access logs capture all insider threat activity (Advanced version only)
- Automated Threat Response: makes data invisible if Cigent Data Defense is disabled (Advanced version only)
- Address data governance and privacy requirements (CMMC, HIPAA, GDPR, GLBA, PCI-DSS, and CCPA)
Easily Deployed Military-Grade Data at Rest Security
Integrated hardware solution
- Pre-boot locking (pre-boot authentication)
- Hardware AES 256-bit encryption engine
- No software required
- No software overhead
- Hardware speeds
Compatible with your systems
- Windows, Linux, hypervisors like SecureView, and Forcepoint
- NVMe and SATA interfaces
- M.2 and 2.5-inch form factors
- Suitable for commercial laptops and desktops
- Use computers from major OEMs, system builders
Perfect for DoD, Federal agency, critical infrastructure, security-conscious organizations
- Address Federal requirements to secure DAR
- Build solutions with highest levels of security at commercial pricing and availability
- No need for expensive, specialized solutions
Download our data sheets with more information on Citadel SSDs with pre-boot authentication.
Building a Citadel of Trust in a Zero Trust World
Your challenge is to secure and protect the Data at Rest under your control to the extent determined by its classification levels. You need to beware the increasing cyberattacks while limiting the attack surface. At the same time, to fulfill your mission, you have to manage cost and complexity while providing authorized users access to files and data across a multitude of platforms.
Is Your Data at Rest (DAR) Truly Secure?
If there’s anything we’ve learned over recent years, it’s that our computer systems in general — and the precious data stored on them in particular — are susceptible to attack by hackers. These bad actors can range from independent entities to nation states.