Containerize Your AI Workflow

RhinOS 26

Secure Enterprise
NAS Operating System

RhinOS 26

RhinOS powers Ciphertex SecureNAS® systems in mission-critical environments, delivering military-grade security, ZFS data integrity, and modern container-based extensibility — all in a simple, hardened, appliance-ready OS.

Engineered for defense, government, healthcare, forensics, energy, and enterprise deployments that demand confidentiality, integrity, and resilience at the edge and in secure data centers.

What’s New in RhinOS 26

A major security and capability upgrade

Designed for secure workloads and controlled application deployment — not a consumer app stack.

Container Support

Run approved OCI containers in a secure, isolated environment.

Docker

Local container development & deployment through Docker with embedded Portainer.

Kubernetes

Large- and small-scale container orchestration through Kubernetes.

Selectable TLS versions

TLS version selection for compliance and zero-trust environments. Support environments needing older TLS 1, and TLS 1.1 through more secure TLS 1.2 and TLS 1.3.

Enhanced firewall & access controls

Strengthened network protection and service hardening with whitelisting and blacklisting by IP and service.

Modernized Web UI

Faster administration experience and improved system visibility.

Up-to-date Security

Continual updating to protect against the latest security threats and maintain optimal operation.

Customer Benefits: Containers, Kubernetes & Enhanced Security

Modern workloads demand more than storage. RhinOS 26 transforms SecureNAS® into a secure application platform — enabling on-device analytics, automation, cyber defense tools, and modern DevOps workflows without sacrificing the hardened appliance security Ciphertex is known for.

Why Containers Matter
for Customers

Containers provide a lightweight, controlled method to deploy modern tools directly on the SecureNAS® — without modifying the OS or risking system integrity.

*Even legacy non-GPU units can run CPU-based AI inference, cyber analytics, and automation containers.

Deploy tools securely without exposing the system to untrusted packages or full OS installs.

Faster deployment cycles for new capabilities, patches, and mission-specific apps.

Run isolated workloads (forensics tools, analytics modules, AI inference engines*, cyber defense agents).

Vendor-approved execution ensures only authorized containers can run.

Zero impact to core NAS stability - containers run in sandboxed zones.

Future-proof architecture aligned with modern DevOps, automation, and edge-compute frameworks.

Benefits of Kubernetes
Integration

Kubernetes brings orchestration and scale to secure environments — even when running as a Worker Node.

What this unlocks for customers:

Distributed workloads across multiple SecureNAS® units (threat analysis, scanning, metadata tagging, microservices).

Secure participation in larger enterprise clusters without exposing the NAS OS to the public internet.

Enterprise-grade automation for container updates, failover, and scaling.

Consistent workloads from dev → test → production even in air-gapped environments.

Hybrid-edge deployments for defense, field forensics, and remote industrial sites.

RhinOS 26 brings “data-plus-compute” to the edge — securely.

Enhanced Security:
Real Operational Value

RhinOS 26’s strengthened zero-trust framework directly improves mission assurance.

Advantages to the Customer:

Security is built into every layer — hardware, OS,
container runtime, and network stack.

Selective TLS (1.0 to 1.3) ensures compatibility with legacy agencies while enabling modern, secure protocols.

RBAC + AD/LDAP ensure only the right personnel access sensitive datasets.

IP Whitelisting/Blacklisting prevents unauthorized hosts from communicating with the system.

Encrypted communication & storage protect data in motion and at rest — even in contested environments.

Hardened services reduce the attack surface for bad actors.

Container isolation prevents application-level vulnerabilities from impacting core system functions.

Security & Compliance

Confidential computing at the core

FIPS 140-2 hardware encryption key integration

Active Directory / LDAP integration

Multi-layer encryption — data at rest & in transit

TLS 1.2+ encryption (selectable protocol versions)

Secure USB port lockdown

Zero-trust principles. Military-validated hardware. Rugged security everywhere.

Role-Based Access Control (RBAC)

Built-in antivirus & firewall protection

Rapid Return on Investment

RhinOS 26 reduces integration effort, removes the need for external compute nodes for many workloads, eliminates licensing costs for common tools, and consolidates storage + secure compute into a single hardened appliance — delivering a significantly faster ROI than traditional NAS or multi-vendor deployments.

ZFS Data Integrity & RAID Protection

RhinOS delivers enterprise-grade data protection using the OpenZFS file system, ensuring fault tolerance, integrity, and
high availability in mission-critical environments.

Mirror

RAID-1

Survives 1-disk failure

Highest redundancy, high-performance reads

RAID-Z1

RAID-5

Survives 1-disk failure

General secure NAS workloads

RAID-Z2

RAID-6

Survives 2-disk failures

Mission-critical, forensic, healthcare, gov

RAID-Z3

RAID-7

Survives 3-disk failures

High-availability + high-capacity clusters

Striped Mirror

RAID-10

Survives multiple disk failures

More capacity with
higher speed

Striped Z1

RAID-50

Survives multiple disk failures

More capacity with
higher speed

Striped Z2

RAID-60

Survives multiple disk failures

More capacity with
higher speed

Striped Z3

RAID-70

Survives multiple disk failures

More capacity with
higher speed

Key Advantages

  • End-to-end checksumming with automated repair
  • Self-healing data paths
  • Inline compression & deduplication
  • Petabyte-scale expansion via VDEVs & pooling
  • Up to triple-parity protection

ZFS delivers integrity, resilience, and speed far beyond traditional RAID controllers —
designed for accuracy, continuity, and regulatory compliance.

Secure Container & Kubernetes Execution

Run secure containerized services with integrated Kubernetes support — designed for controlled enterprise and mission-critical environments.

OCI container support

Kubernetes-enabled runtime
for Cluster participation

Isolated execution environment
for high-security deployments

Local container development,
testing, and deployment through
Docker and a special local
version of Portainer

Kubernetes Worker-Node
capability for secure, scaled
distributed container workloads

Deploy forensic tools, cyber
defense agents, analytics
modules & secure workloads

Preserves
appliance-grade
security posture

Optimized for secure scaled participation in Kubernetes environments — can act as a worker node in your cluster.

Enterprise File & Block Services

Flexible multi-protocol access to meet any IT workflow

SMB/CIFS with AD support
NFSv4
iSCSI block storage
Rsync client/server
WebDAV & SFTP/FTP
USB share support

Mix secure file-sharing, SAN, backup, and remote workflows seamlessly.

Virtualization & Edge Compute Support

Run controlled virtual machines for secure tasks and isolated workloads

VirtualBox-enabled
VM support
Windows, Linux, BSD
and proprietary guest
OS options
RDP access
Simple import/export across
virtualization platforms

Forensics, cyber tools, and system appliances — without external infrastructure.

Backup, Replication & Recovery

Built-in data durability and ransomware resilience

Backup UI
  • Duplicati-based encrypted backup
  • Multi-site replication
  • Cloud backup targets (Azure, AWS S3,
    Google Cloud, etc.)
  • Schedule or manual sync jobs
  • USB one-touch backup
  • Volume/LUN snapshots & instant

Keep mission data safe — anywhere.

Management and Monitoring Diagram
For Secure & Regulated
Use Cases
Validated across demanding environments.
  • U.S. military & defense missions
  • Federal & state government
  • Law enforcement & digital forensics
  • Healthcare & HIPAA environments
  • Energy, oil & gas, and remote industrial sites
  • Cybersecurity labs & critical infrastructure
Trusted where failure is not an option.
Scroll to Top