DIGISTOR DIG-M2N2C12568 internal solid state drive M.2 256 GB PCI Express 3.0 NVMe
DIGISTOR DIG-M2N2C12568. SSD capacity: 256 GB, SSD form factor: M.2, Read speed: 3200 MB/s, Write speed: 1300 MB/s, Component for: PC/notebook
SKU: 6609721
Manufacturer part number: DIG-M2N2C12568
Data at Rest Security... Simplified Citadel FIPS-certified self-encrypting drives (SEDs) are the only SSDs to integrate multifactor authentication, pre-boot authentication (PBA), and hardware encryption into a complete, low cost solution.
Pre-boot Authentication Keeps Intruders Away Powered by Cigent®, our built-in PBA unlocks access to the encrypted operating system or virtual machine on the Citadel SSD as well as the data stored there. This secured data is encrypted by NSA-approved Advanced Encryption Standard (AES) 256-bit encryption at the hardware level. Once booted, Citadel allows no-overhead, hardware-speed access to encrypted data at the full performance of the system.
Adversaries cannot steal what they cannot see Unreadable storage partition protected by non-recoverable key.
Worry-Free Deployment Cigent software is tested and validated for use with DIGISTOR SSDs.
Multi-Factor Authentication (MFA) Requires more than one authentication for access. Multiple authentication methods include password, CAC/PIV smartcard, and PIV-supported Yubikey.
Additional Authentication for File Access Zero-day ransomware, malware, and software service bypass prevention.
NIAP-Listed, TAA Compliant, and Common Criteria Certified Citadel C Series Advanced SSDs are NIAP-listed, TAA compliant, and have been listed by NIST as FIPS 140-2 L2 certified storage devices with NIST Certificate #4294.
Address critical requirements for data governance and privacy programs Citadel C Series SSDs meet CMMC, HIPAA, GDPR, GLBA, PCI-DSS, and CCPA requirements.
- Pre-boot authentication keeps intruders out
- Zero Trust architecture
- Additional authentication for file access
- FIPS 140-2 L2 + Common Criteria (CC) versions available: NIST certificate #4294. Listed on the NIAP Products in Evaluation List
- Verified device erasure
- Secure data access logs
- Automated Threat Response
- Address critical requirements for data governance and privacy programs