DIGISTOR, known for its secure data storage, including a wide range of self-encrypting drives (SEDs), has announced that C Series SEDs are now available. The C Series SEDs, powered by Cigent®, provides cybersecurity features layered onto our self-encrypting TCG Opal and FIPS 140-2 L2 SEDs.
To create the C Series, we’ve been working closely with Cigent, a leader in the world of cybersecurity software tools. Cigent enables their customers to create data security solutions that are “Impossibly Secure!”
Cigent co-founder John Benkert spent 20 years in the United States Air Force (USAF) Intelligence Service. John also spent seven years in the National Security Agency (NSA) where he received the National Scientific Achievement Award for technological innovations in data security. Recognizing the vulnerabilities inherent in existing data security solutions—including full disk encryption (FDE) and self-encrypting drives (SEDs)—John set out to design a more secure approach to data protection. Funded by In-Q-Tel, he formed a team of experts in storage, data forensics, and cybersecurity, resulting in the most secure data security solution available. It’s this solution that is integrated into DIGISTOR C Series SEDs.
C Series SEDs feature multi-factor authentication (MFA) supported by a variety of popular third-party services. C Series drives also use a novel approach to create and store credentials. Using the maximum length supported by the drive, credentials are cryptographically derived from a user-supplied password and are never stored in their final form. This results in tamper-proof credentials.
Data becomes invisible on C Series SEDs. Even after logging in, designated folders and files simply don’t appear to be on the drive. With data unseeable and unreadable, physical and remote attacks are prevented.
Perfect for Zero Trust Security
Zero trust security, with its “never trust, always verify” model, focuses on protecting data. In zero trust architectures, devices are not trusted by default. This is true even if they are connected to a managed network and even if devices have been previously verified.
The combination of MFA and file/folder invisibility make C Series SEDs perfect for zero trust environments.
Secure Under Attack
Sophisticated cyberattacks commonly remove all trace of their presence, including modifying or deleting OS access logs. C Series Advanced drives automatically maintain their own secure access logs. These logs are securely stored on the drive in an area that can neither be seen nor wiped by an adversary, thereby preventing insiders or external attackers from covering their tracks. This is the only solution that is capable of tracking data theft when an insider boots off a USB stick. These secure access logs may be used for forensic investigations, incident response, non-repudiation, and possibly litigation.
C Series Advanced drives also feature a “keep-alive heartbeat” that ensures Cigent software is always running. In-use data is immediately made invisible by Cigent-based firmware, thereby protecting against adversaries even if they figure out how to disable Cigent’s security software.
Data Destruction Confidence
Last, but certainly not least, C Series Advanced drives offer verified data destruction in the form of block-level verification. The SEDs verify that data has been irrevocably deleted and is irretrievable by any known method. C Series drives can then be safely repurposed or retired, thereby saving money, as well as the need to qualify and validate different secure storage solutions.
For information about configurations and features now available in C Series SEDs, visit digistor.com/c-series.
At DIGISTOR, we specialize in helping military and government agencies and commercial entities of all sizes find the right encrypted storage solution to secure their DAR. With a wide range of secure storage offerings, from bare drives to removable solutions to Commercial Solutions for Classified (CSfC)-ready SEDs, we can assist you with specifying the appropriate storage devices to secure your important data. If you have any questions as to how securing DAR might apply to your own data security requirements, please feel free to contact us.