Data Security Matters

Data Security Breaches Cost The Global Economy 400 Billion Per Year1
How much does your data exposure cost you?


Smart Data Security

AES 256-bit encryption makes data an asset, not a liability.

Proactive Protection

Avoid the risk, the cost to rebuild after a cybercrime is 8.5 billion2.


Meets HIPAA, SOX, GLBA, HITECH, PCI-DSS, and FCC CPNI regulations.

Trusted and Valued

Proudly supporting the U.S. Military and U.S. Government.


Data is your company's most valuable asset.  If stolen or lost, your organization risks loss of revenue, legal and compliance implications, and a loss of reputation. The cost to recover your data from a breach or loss is exponentially more expensive than the cost to protect the data in the first place.


With data security threats on the rise, detection and prevention are critical to ensure business networks are safe from unwanted visitors. Such threats go unnoticed until significant damage has already been done. Taking steps to ensure that customer, personal employee, research and development (R&D) and confidential data remains safe and secure can save your organization from financial loss, a damaged reputation and a PR disaster. 

Ciphertex Data Security has solutions to strategically protect your important sensitive data. From the smallest single drive to our full scale 60-bay rack mount NAS server, our products are equipped with enterprise data protection features, like hardware based AES 256-bit encryption and RAID protection. Ciphertex products have gone through rigorous testing to ensure our solutions meet all data privacy standards. We specialize in data security and our products are designed to prevent threat exposure and increase productivity.


AES is a data protection algorithm engineered to translate normal data into a proprietary or “secret” code which requires a “key” to decipher. Recognized by the United States government and governments around the globe and unbreakable by even the fastest supercomputers combined, it is the preferred standard for protecting highly classified documents.


In contrast with slow and inconvenient software encryption, hardware encryption is a reliable and fast solution. Hardware encryption uses a dedicated processor physically located on the drive allowing for better system performance. The encryption is tied to a specific device, so encryption is “always on”. 

Hardware encrypted drives are not subject to updates, proving to be a more cost-effective and easily scalable option. These key factors make securing data substantially quicker and more efficient.


There are various laws, regulations and guidelines that address security and privacy. From FIPS 140-2 to HIPAA and HITECH, businesses today must integrate these regulations into their security standards. Ciphertex is fully compliant with the following industry regulations.

  • U.S. Federal Communication Commission’s (FCC) Customer Proprietary Network Information (CPNI) regulations
  • U.S. Federal Information Processing Standards (FIPS) 140-2 compliant data-at-rest and data-in-motion encryption
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Health Information Technology for Economic and Clinical Health Act (HITECH)
  • Payment Card Industry Data Security Standard (PCI-DSS)
  • Gramm-Leach-Bliley Act (GLBA), or the US Financial Modernization Act
  • Sorbanes-Oxley Act (SOX)

What Proactive Data Security Solution Does Your Business Need?


 Single DriveNASRanger
(Secure RAID)
RackmountThunderbolt (MAC)
Encryption (AES 256-bit)  ✓  ✓  ✓  
Business Continuity & Disaster Recovery (Real-time remote replication)    
Client Security (SMB3, HTTPS, IPSec)        
User Security (Access Control)