Organizations Worldwide Trust Their Data To Ciphertex®

  • icon department-of-defense-logo-data-security-ciphertex-usa.png
  • icon nasa-logo-data-security-ciphertex-usa.svg
  • icon seal-new-york-state-police-logo-ciphertex-usa.svg
  • icon navy-department-logo-data-security-ciphertex-usa.svg
  • icon depatment-of-treasury-logo-data-security-ciphertex-usa.svg
  • icon homeland-security-department-logo-data-security-ciphertex-usa.svg
  • icon airforce-department-logo-data-security-ciphertex-usa.svg
  • icon first-aid-logo-data-security-ciphertex-usa.svg
  • icon hipaa-compliant-logo-data-security-ciphertex-usa.svg
  • icon bank-of-america-logo-data-security-ciphertex-usa.svg
  • icon cerner-company-logo-data-security-ciphertex-usa.svg
  • icon warner-brothers-logo-data-security-ciphertex-usa.svg
ciphertex-proudly-made-in-the-USA-button-white
icon department-of-defense-logo-data-security-ciphertex-usa.png
icon nasa-logo-data-security-ciphertex-usa.svg
icon seal-new-york-state-police-logo-ciphertex-usa.svg
icon navy-department-logo-data-security-ciphertex-usa.svg
icon depatment-of-treasury-logo-data-security-ciphertex-usa.svg
icon homeland-security-department-logo-data-security-ciphertex-usa.svg
icon airforce-department-logo-data-security-ciphertex-usa.svg
icon first-aid-logo-data-security-ciphertex-usa.svg
icon hipaa-compliant-logo-data-security-ciphertex-usa.svg
icon bank-of-america-logo-data-security-ciphertex-usa.svg
icon cerner-company-logo-data-security-ciphertex-usa.svg
icon warner-brothers-logo-data-security-ciphertex-usa.svg

Products

1 - post
2 - post
3 - post
4 - post
5 - post
6 - post

Ciphertex OS

The Ciphertex operating system comes installed on every SecureNAS®. There is no charge for the license and no renewal fees. Key features:
advantage-stack-icon-data-security-ciphertex-data-security-usa
The Ciphertex Advantage
  • Encryption Fibs 140-2 Level 3
  • Multi-Factor Authentication
  • AES-256 Encryption
  • Key Management
  • NIST 800-88 Sanitization
  • USB Port Lockdown
  • Preconfigured Firewall
iscsi-target-icon-data-security-ciphertex-los-angeles-county
Flexible Account Management
  • Built-in Administrator
  • User and Group Assignments
  • ADS Integration
nfs-shares-setup-icon-data-security-ciphertex-data-security-los-angeles-county
Storage and Sharing
  • ZFS Implementation
  • Z RAID
  • Deduplication
  • FTP/SMB/CIFS/NFS
  • iSCSI Target
  • Portable USB
networking-dual-monitor-icon-data-encryption-systems-ciphertex-usa
Networking
  • TCP/IP
  • DNS
  • Bonding
  • Routing
  • Custom Hosts
data-duplication-icon-data-security-ciphertex-data-security-los-angeles-county
Backup & Restore
  • Flexible Scheduling
  • Client and Peer
  • Snapshots
  • Updates via Web Interface
notification-bell-icon-data-security-ciphertex-data-security-usa
Status & Notifications
  • Status Logs
  • Performance Profile
  • Drive Health
  • LCD Front Panel Display
  • Hardware Sensors
  • Environmental Sensors
  • Emailed Alerts

Latest News

February 10, 2023

Why Data Security Is Important in the Forensic Industry

Data security has become an incredibly important matter in the forensics industry. In fact, a whole new branch of forensic science has emerged, Digital Forensics. Digital Forensics is a field…

January 5, 2023

Why Healthcare Data Security Solutions Are Important in the Healthcare Industry

Data security is an essential part of the healthcare industry for protecting confidential patient information and complying with regulations like those mandated by HIPAA. In the past, it was fairly…

November 16, 2022

SSD Interfaces: SAS vs. SATA vs. NVMe

Solid-state drives (SSDs) and their affiliated technology continue to evolve rapidly. In recent years, SSDs have made major strides in lowering latency, boosting efficiency, and enhancing performance—and it’s clear that…

November 12, 2022

Cut Data Encryption Costs with Ciphertex

At Ciphertex, our mission is to protect the data of every professional and organization on the planet by delivering powerful and portable data systems with advanced encryption and migration features.…

November 4, 2022

Top Cyberattack News and Secrets Revealed

Any business owner who doubts the need to invest in cybersecurity is unlikely to maintain those doubts after exploring today’s headlines. The fact is that the world of cybersecurity is…

October 28, 2022

How Do I Protect My Organization from Ransomware Attacks?

Ransomware can trace its origins to the 1989 PS Cyborg virus, which spread by floppy disk and demanded a $189 payment sent to a PO box for remediation, but it…

September 1, 2022

TLC vs. QLC SSDs: How to Choose the Right One for You

Introduced to consumers in 1991, solid-state drives (SSDs) have undergone a series of enhancements and upgrades since the primitive first models hit the marketplace three decades ago. Today, SSDs have…

August 2, 2022

Why GSA-Contracted and SEWP-Contracted Devices Are Critical for Enterprise Applications

The contemporary business world devotes a substantial amount of resources to data—more specifically, to the implementation of procedures and accessories devoted to accumulating it, analyzing it, and safeguarding it in…

August 2, 2022

What is Data Storage?

The modern business world is an increasingly data-driven environment. Businesses collect massive amounts of information from their customers: birthdates, shipping addresses, payment card data, purchase history, and other descriptive metadata.…

May 13, 2022

How Remote Teams Protect Data in the Entertainment Industry

With the cost of TV and film productions routinely running into the eight figures, entertainment companies should do whatever possible to safeguard all the data generated over the course of…

May 5, 2022

What You Need to Know About Malware

Malware—short for malicious software—is the umbrella term for any type of program created to inflict harm on a computer, server, or network. There is a broad range of variation in…

April 28, 2022

Top Cybersecurity Challenges for Healthcare Organizations

The healthcare industry is hardly alone in facing serious cybersecurity risks, but it is unique in the consequences it faces for failing to prevent attacks from internet-based criminals. One of…

  • Trusted by
  • hipaa-compliant-logo-data-security-ciphertex-usa
  • seal-new-york-state-police-logo-ciphertex-usa
  • navy-department-logo-data-security-ciphertex-usa
  • nasa-logo-data-security-ciphertex-usa
  • airforce-department-logo-data-security-ciphertex-usa
  • first-aid-logo-data-security-ciphertex-usa
  • warner-brothers-logo-data-security-ciphertex-usa
  • universal-studios-logo-data-security-ciphertex-usa
  • bank-of-america-logo-data-security-ciphertex-usa
  • homeland-security-department-logo-data-security-ciphertex-usa
Sign up for our newsletter