Rugged Fortified Storage.

Streamlined Performance.

The SecureNAS® Enterprise Operating System NAS software is designed for speed, reliability and superior security.

Key Features of RhinOS 24.1

SecureNAS® Enterprise NAS Software is designed to reduce the complexity of data security. With FIPS 140-2 Level 3 validated cryptographic modules, OpenZFS, automated backup, and migration come pre-installed on every SecureNAS® Enterprise making sharing data between many connected devices a breeze.

Built on Enterprise Linux V6.8 RhinOS 24.1 leverages the latest technologies for superior performance with advanced security comparable to Red Hat Enterprise (RHEL)

Administration Made Easy:

  • Web-Based IP Interface: Manage your SecureNAS® remotely through an intuitive web-based graphical interface.
  • Efficient Data Management: The lightweight web GUI frees up memory for other important data serving tasks.
  • Simplified Collaboration: Share files easily on your network.
  • Comprehensive Status & Notifications: Track alerts, anomalies, and system events through the web UI.
  • Cost-Effective: RhinOS 24.1 comes pre-installed on every SecureNAS® appliance at no additional cost.
  • Scalability: Designed to scale with your business, offering petabyte scalability through ZFS integration.

Data Security & Integrity

  • Ciphertex Protect® Key: FIPS 140-2 Level 3 certified hardware encryption keys provide unparalleled security.
  • Encryption at Every Level: Whether your data is at rest or in transit, multi-layered encryption at the system, hardware, and software levels protects it.
  • USB Port Firewall: SecureNAS® ignores all communication from unauthorized external USB devices.
  • Antivirus Protection: RhinOS 24.1 enterprise NAS software employs industry-approved ClamAV service for robust antivirus protection. It features automated updates or manual updates if off-network, keeping your data clean and free of viruses and malware.
  • Firewall Protection: If you install your SecureNAS® Enterprise in an open environment, SNE24.1 provides a firewall to block malicious attacks and unauthorized access to your secured data.
  • ADS Integration: authenticate users against the Active Directory, allowing administrators to apply consistent security policies across the network.

Robust Storage Capabilities

  • ZFS Architecture: Ensure data integrity with RAID-Z redundancy levels and proactive corruption detection.
    • STRIPED => similar to RAID-0
    • MIRROR => similar to RAID-1
    • RAID-Z => similar to RAID-5
    • RAID-Z2 => similar to RAID-6
    • RAID-Z3 => similar to RAID-7
    • Striped RAID-Z => ZFS-Striped of RAID-Z/2/3
  • Deduplication & Compression: Optimize storage space and performance with block-based data deduplication and inline compression (LZ4, LZJB, ZLE, GZIP 1.9).

Scale up or scale out with ZFS.

ZFS architecture works similarly to traditional hardware RAID, except it uses smaller RAIDs in partitions called “Vdevs”, or virtual devices. ZFS detects silent data corruption better than traditional RAID and it writes data to a log before writing to storage blocks — if a drive fails or the system shuts down unexpectedly, the cached log will store the writes-in- process until ZFS determines it’s safe to resume.

How RAID-Z Differs from Traditional RAID Systems

ZFS RAID-Z is a file system and logical volume manager that introduces advanced features and functionalities that set it apart from traditional systems. One of the standout features of ZFS RAID-Z is its end-to-end data integrity through its checksumming feature. The system computes a checksum every time data is written to or read from a disk and compares it to the original to ensure data integrity.

Unlike traditional RAID, which relies on hardware controllers for data redundancy and performance, ZFS RAID-Z handles these functions at the software level. It eliminates the need for expensive hardware controllers and allows for more flexibility and customization. Additionally, ZFS RAID-Z offers features such as data compression, deduplication, and snapshots, making it a robust and versatile storage solution.

Striping is the process of distributing blocks of data across hard drives. Input data is split up into pieces known as striped units. If you refer to this diagram, striped units Block 0 through Block 8 would be considered a stripe.

A single hard drive handles read and write operations one at a time. In contrast, a RAID 0 system enables parallel processing, allowing the system to perform read and write operations across multiple drives simultaneously. For example, the owner of a striped system can access Block 0, Block 1, and Block 2 at the same time, significantly improving performance.

Mirroring writes all data simultaneously to two drives, creating a 1-for-1 copy that offers the highest level of redundancy. This setup also delivers excellent read performance, as the system can access both drives in parallel. Write performance remains steady because both drives write the same data at the same time. However, RAID-1 comes with a higher cost since it requires double the storage capacity to mirror data. Traditional RAID-1 supports only two drives, which limits its scalability for larger storage needs.

RAIDZ provides redundancy by using parity, allowing data recovery without the need for full duplication on a second drive. It mathematically creates a new block of data across multiple disks, so if one drive fails, the RAID controller can reconstruct the missing data from the remaining drives. RAIDZ supports single parity, enabling the system to continue functioning even if a drive fails, with parity distributed across the disks to balance access and improve performance. While RAIDZ offers high storage capacity and reliability, performance is slightly reduced due to the calculations required for reading and writing data.

RAID-Z protects against a single drive failure and can actively rebuild the data. RAID-Z2 goes further by using two separate sets of parity calculations, allowing it to recover from two simultaneous drive failures—what’s known as N+2 redundancy. To function properly, RAID-Z2 requires at least four drives: two for data and two for parity. It performs best when used with a larger number of disks, though only to a certain point. As disk count increases, so does efficiency—but also the risk of multiple failures and the complexity of rebuilding. RAID-Z2 strikes a strong balance between capacity, redundancy, and performance, making it the preferred choice for high-capacity storage environments.

RAID-Z3 is the most advanced level of RAID-Z, offering triple-disk redundancy. It can withstand the failure of up to three disks without losing any data. RAID-Z3 is ideal for environments where data integrity is critical and cannot afford any data loss.

Data Access & Storage Protocols

RhinOS 24.1 provides extensive support for accessing and sharing data via:

  • CIFS/SMB: Provides Windows Share access
    • Full Active Directory integration for easy access to protected data
    • Use local accounts when Active Directory is not available
    • Easy discovery of your SecureNAS® in your Network
    • All versions of the CIFS protocol are supported from old WinNT to the latest secured version
    • Supports advanced Windows ACLs
  • NFS: Traditional UNIX remote access, latest NVS Version 4 supported
  • FTP: Supports both standard unsecured FTP and secured FTP over SSL
  • WebDAV: Browser-based data access
    • Access your data via a standard browser or other tools that support WebDAV such as WinSCP
    • Users can only access data that is allowed
  • iSCSI: Supports latest protocol version and security
    • Create raw storage volumes within ZFS which can be shared
    • Easily create a SAN using your SecureNAS® Enterprise
  • Rsync: Easily sync data with SecureNAS® Enterprise
    • Both client and server
    • Client jobs can be scheduled or on-demand

Attached USB storage drives can be shared out to the network using the above methods.

Virtualization & Networking

RhinOS 24.1 is optimized for virtualization, and VirtualBox V7 has been modified and tuned to run any virtualized Intel-based machine with flexibility and performance.

  • Supported OS: Windows, Linux, FreeBSD, and more
  • Wizards for Easy Setup: Beginner and advanced options available
  • Remote Access: RDP for virtual machine consoles
  • VM Management: Virtual Media Manager makes it easy to create and manage storage resources for your virtual machines
    • Easily import and export VM’s from and to other virtualization technologies including Microsoft Hyper-V, VMware, Linux KVM, Red Hat Virtualization, and more

Flexible Networking Options

  • Connection Flexibility: Configurations from a single 1G connection to multiple bonded 100G connections
  • Configuration: Simple static or automatic via DHCP
  • Customizable Routing: Optimize routing with configurable local routing tables and DNS settings
  • Hosts: Add custom host entries in order to resolve host names without using a DNS

Backup, Restore & Remote Management

RhinOS 24.1 offers secure and flexible backup options:

  • Custom Duplicati Integration: A customized Duplicati version has been tailored and tuned specifically for the SecureNAS® Enterprise
    • Compresses data inline to reduce network utilization, especially important over slow network connections
  • Automated Redundancy: Integrated redundancy and backup tools across the SecureNAS® Enterprise Portfolio
  • Managing with Wizards make it easy to:
    • Create new configurations
    • Import backup configuration from other SecureNAS® machines
    • Search backed-up data
    • Import backup sets from other SecureNAS® machines
    • Restore data whether a single file or terabytes of files
    • Backed-up data can be encrypted for secure remote storage
    • Scheduled or manual backup jobs
  • USB Data Management: Easily back up or copy USB flash drives and storage with a simple “COPY” button on the front panel. SNE24.1 will copy all new or changed data to a preconfigured storage location.
  • Advanced Options: Tune the backup jobs to meet your requirements

Backup Destinations Include . . .

...and many more!

Snapshot & Recovery:

  • Volume and LUN snapshots: Safeguard your SecureNAS® data, including folders, files, and iSCSI LUNs
  • Block-based snapshots: These incremental backups capture only that changes that are made
  • Versioning: Schedule snapshots to minimize the risk of data loss
  • Restore with one click: Easily revert an entire volume/LUN or selectively restore specific files and folders

Notifications & Remote Control:

  • Manage and monitor your SecureNAS® Enterprise from anywhere:
    • Web UI tracks all alerts, anomalies, and other events
    • See and resolve problems proactively
    • Integrate notifications into your SNMP configuration for centralized notifications
    • Send notifications via mail and SMS
    • Front panel LED will be green when all is OK and red when attention is needed
    • Front panel LCD shows current version information and IP address
    • Power on or shut down your SecureNAS® remotely
    • Remotely save and restore system configurations on any SecureNAS® and perform system updates via the server’s web interface, without physical interaction
    • Access Network Recovery Console to reconfigure network settings when your SecureNAS® is unreachable

Advanced System Features

Intelligent Storage Solutions

  • UPS Integration: Automatic orderly, safe shutdown during power issues with support for all leading UPS manufacturers
  • Date & Time Configuration: User-configured NTP servers, time zone settings, and manual time configuration
  • User & Group Security:
    • Local Database of Users and Groups
    • Maintained through Web UI
    • Access to SecureNAS® Configurations definable by Local Users and Groups
    • Access to your data definable by Local Users and Groups
    • Install your own SSL certificate or use a RhinOS 24.1 - generated SSL certificate for secure communications and data sharing
  • System Monitoring & Diagnostics: Proactive alerts and detailed system health monitoring
    • Drive Failures: Notifications for failing hardware
    • System Health: Easily monitor the health of your SecureNAS® by viewing the condition of temperature and voltage sensors, drives, and fans
    • System Logs: Generate System Log Dumps for Ciphertex Support diagnostic activities

Ultimate expansion option

Modern IT infrastructures are powerful and adaptable, yet, often challenging to manage. Ciphertex SecureNAS® Enterprise Series with RhinOS 24.1 software help reduce the complexity of your IT infrastructure with intuitive tools that work together to deliver automated, repeatable processes to enable simple management.

Data Security Device

SMB / CIFS

  • iSCSI
  • WebDav

Optional Network/
Graphic Interface Cards

10G Copper / Fibre

Upgradable to 50G Fibre and *200G on
select systems

Your Security Is Key

Encryption Key Management:

  • Ciphertex Protect® Encryption Key is a FIPS 140-2 Level 3 validated hardware encryption module that encrypts network shares at the filesystem (or volume) level.
  • To activate the key, it must be paired via the web GUI (administrators have the option to set a passphrase).
  • After pairing, encrypted data residing on the Ciphertex SecureNAS® Enterprise volume cannot be accessed unless the Ciphertex-Protect® key is inserted into the USB Type-C port on the front of the server.
  • If the administrator designated a password, it must also be entered to unlock the volume.
  • Key Server – RhinOS 24.1 supports centralized storage and management of the encryption key(s) on any key server supporting KMIP.

Software Technology Partners

Ciphertex® works with network of secure supply chain partners around the globe to provide our customers with reliable solutions

Confidential computing is our core value.

We believe in secure and resilient network infrastructure for the American people. The U.S. government and military source Ciphertex® systems through GSA.

Proudly Made in the USA
GSA Schedule 70 Contract
Scroll to Top