SYSTEM_STATUS: ONLINE // READY

Your Data.
Under Your Control.

CIDNIC builds S3-compatible storage software and appliances for organizations that require security, governance, and operational ownership—without defaulting to a single public cloud control plane.

Secure CIDNIC server infrastructure with active status lights
● REPLICATION_ACTIVE
SYNC: HEALTHY
● ENCRYPTION_ON
AES-256-GCM

Enterprise Snapshot

An appliances-first object storage platform engineered for enterprise realities: procurement-ready deployments, predictable operations, and S3-compatible integration for modern workloads.

CID-X1 Data Center appliance
● APPLIANCE_READY
MODEL: CID-X1
FLAGSHIP APPLIANCE

CID-X1 Data Center

High-density, enterprise storage appliance optimized for CIDOrbit Enterprise—built for predictable scale, resilient operations, and procurement-aligned deployments.

Capacity
Up to 1.8PB raw
Network
4× 100GbE
Security
TLS + Object Lock (WORM)
Operations
Metrics + health endpoints

CIO / IT

Standardize on validated appliances for repeatable rollouts, then extend with software deployments where you need flexibility—without breaking S3 tooling or pipelines.

CISO / Security

Hardened controls for regulated data: TLS in transit, encryption at rest, RBAC, and immutable retention patterns with Object Lock (WORM) to strengthen ransomware posture.

Finance / Procurement

Procurement-friendly options with clear sizing inputs, support tiers, and a structured evaluation path—built for predictable budgeting and long-term operational ownership.

The Ecosystem

Start with appliances for standardized deployments, then extend with software editions and enterprise utilities—built to integrate with the tools your teams already use.

CID-X1 High-Density Data Center Appliance
APPLIANCE HIGHLIGHT
CID-X1 Data Center
High-density storage appliance optimized for enterprise durability, governance, and performance.
Scale
Petabyte density
Governance
RBAC + WORM
Integration
S3-compatible

CID-XS Appliance

Compact edge and ROBO appliance for standardized remote deployments with the same S3-compatible workflow.

EDGE / ROBO READY

CIDOrbit Enterprise

Governance and resilience features for regulated environments—Object Lock (WORM), RBAC, replication, and enterprise support options.

Just Data Copier (JDC)

Enterprise-grade file transfer utility with resume, verification, tuning, and operational observability—designed to fit existing workflows.

CIDOrbit Community

A free entry point for developers and labs—S3-compatible on a single node to evaluate workflows before scaling.

Engineering with Principles

We don't chase trends. We build solid foundations for the next decade of data storage.

Sovereign by Design

Run storage on infrastructure you control. Telemetry is optional. Key management is designed for customer governance via LocalKMS and external KMS options.

Open Standards

We believe in avoiding vendor lock-in. While our engine is proprietary, we prioritize open API standards (S3) so your applications remain portable.

Privacy First

Privacy isn't a setting; it's architecture. From encryption-at-rest to strict access controls, we engineer for high-assurance environments.

Product Lineup

CIDNIC’s CIDOrbit platform delivers Amazon S3 API–compatible object storage for organizations that need predictable performance, strong governance controls, and deployment flexibility across edge and data center environments.

Choose the model that matches your operating requirements: software editions for integration into existing infrastructure and automation, or turnkey hardware appliances for standardized procurement, repeatable rollouts, and consistent operations.

Designed for enterprise needs
  • Application portability with S3 API compatibility
  • Governance controls such as RBAC (Role-Based Access Control)
  • Immutability options like Object Lock with WORM (Write Once, Read Many)
  • Edge and ROBO (Remote Office / Branch Office) deployment support

Hardware Appliances

CID-XS Edge Server hardware
CID-XS Appliance

CID-XS Appliance

Edge & ROBO

Compact, quiet, and powerful. Designed for remote offices and edge computing where space is at a premium but reliability is non-negotiable.

CID-X1 Rack Server hardware
CID-X1 Data Center

CID-X1 Data Center

Data Center Series

High-density 4U rackmount storage server. Massive capacity, dual-redundant architecture, and NVMe acceleration for enterprise workloads.

Software Editions

CIDOrbit Community

Free Forever

The entry point to our technology. Perfect for developers, home labs, and single-node workloads. Full S3 compatibility included.

RECOMMENDED

CIDOrbit Enterprise

Commercial License

For regulated and mission-critical environments. Includes data scrubbing, disk remapping, Object Lock (WORM), RBAC, multi-site replication, and enterprise support options.

Enterprise Utilities

Just Data Copier (JDC)

Free Enterprise Utility

A high-performance, enterprise-grade network file transfer utility designed for mission-critical environments. Features adaptive network optimization, resume capability, and smart hash verification.

Built with Go

Just Data Copier

Free Utility

High-performance, enterprise-grade network file transfer utility designed for mission-critical environments.

Technical Specifications

  • License MIT / Free
  • Throughput Optimized Parallel Processing (2TB+ chunks)
  • Security TLS/SSL Encryption + Token Auth
  • Integrity Smart Hash (Auto MD5 / BLAKE2b)
  • Observability Prometheus Metrics + Health Checks

Download Now

Single binary. No dependencies.

Docker Pull:

docker pull yousafgill/justdatacopier:2.0.0

Key Features

Smart Hash Verification

Auto-selects optimized hashing for large files (e.g., BLAKE2b) to improve verification efficiency in real-world transfer workloads.

Resilient Resume

Chunk-level resume helps avoid restarting large transfers from scratch after interruptions.

Adaptive Network

Real-time profiling of RTT and packet loss to automatically tune window sizes.

Batch Processing

Supports wildcard patterns for mass transfer of logs, backups, and data sets.

Use Cases

Server Migration Log Aggregation Backup Replication High-Latency Links

Enterprise Benefits (Built to Fit Existing Workflows)

Works with how teams already operate

JDC is a single-binary utility designed to drop into established runbooks and automation. Use it interactively for first-time setup, or run it headless with flags/YAML for repeatable transfers.

  • Single binary; no runtime dependencies
  • CLI flags + YAML configuration (flags override config)
  • Dry-run mode to validate changes before production
Performance and reliability for critical moves

Move files from MB to TB+ efficiently with parallel chunking, resumable transfers, and optional verification. Adaptive network tuning helps sustain throughput across diverse network conditions.

  • Chunk-level resume with integrity checks
  • Optional hash verification (disabled by default)
  • Adaptive tuning based on RTT (round-trip time) and packet loss

Quick Start (Client / Server)

Server mode (receiver)
jdc -server -output ./destination_folder
jdc -server -listen 192.168.1.10:9000 -output ./destination_folder

Run JDC as a receiver on the target host, specifying an output directory and (optionally) a listen address/port.

Client mode (sender)
jdc -file ./my_large_file.bak -connect server_address:8000
jdc -file ./large_log_file.txt -connect server_address:8000 -compress

Send from client to server over the network. Use optional compression where it makes sense for your data types and link.

Recommended for first-time users

Interactive setup walks you through mode selection, performance presets, and security options.

jdc -interactive

Configuration, Batch Transfers, and Change Control

YAML configuration

Generate templates, review settings in version control, and reuse consistent transfer profiles across teams and environments.

jdc -generate-config server > jdc-server.yaml
jdc -config jdc-server.yaml -workers 8 -metrics
Batch mode

Move sets of files using comma-separated lists or wildcards—ideal for logs, daily backups, and staged migrations.

jdc -files "logs/*.log,backups/*.bak" -connect server:8000
jdc -files "data/*.csv" -connect server:8000 -compress -verify
Dry-run validation

Validate configuration and workflow changes without actual file I/O—useful for approvals and change windows.

jdc -server -dry-run -output ./test
jdc -config jdc-server.yaml -dry-run
Notes: YAML (Yet Another Markup Language) is a human-readable configuration format. In JDC, CLI flags override configuration-file values.

Security, Verification, and Performance Tuning

Enterprise security controls
  • TLS/SSL encryption with token authentication
  • Path validation to help prevent directory traversal
  • Privacy-focused logging (no sensitive paths or hash values)
  • Resource limits: connections, memory, and bandwidth controls
Verification & tuning (examples)

Hash verification is disabled by default. When enabled, JDC negotiates an optimized algorithm (MD5 for <50GB; BLAKE2b for ≥50GB).

jdc -server -verify
jdc -file myfile.bak -connect server:8000 -verify -adaptive
RTT = round-trip time. Use `-adaptive` to tune behavior on higher-latency or lossy links.

Observability (Prometheus Metrics + Health Endpoints)

JDC exposes Prometheus-compatible metrics and Kubernetes-style health endpoints so operations teams can monitor throughput, error rates, resource usage, and service readiness without custom instrumentation.

Enable metrics
jdc -server -metrics -metrics-addr "0.0.0.0:9090"
Endpoints: `/health`, `/readiness`, `/liveness`, and `/metrics`.
Monitored high-performance transfer
jdc -server -metrics -metrics-addr "0.0.0.0:9090" -workers 8 -verify
jdc -file large-db.bak -connect server:8000 -chunk 8388608 -buffer 1048576 -workers 8 -verify -adaptive -compress
Transfer
bytes, duration, active transfers
Network
latency, bandwidth, errors
Resources
memory, connections, open files

Common Options (Operational Cheatsheet)

-verify
Enable optional hash verification (client and server).
-compress
Compression with file-type awareness.
-workers <n>
Parallelism (default: ~half CPU cores).
-chunk / -buffer
Transfer chunking and buffering controls.
-adaptive
Adaptive network optimization (RTT/packet loss).
-dry-run
Validate configuration without file I/O.

CIDOrbit Community Edition

Distributed object storage for single-node deployments.

Specifications

  • License Free Community License
  • Max Nodes 1 (Single Server)
  • Erasure Coding Fixed (8+4)
  • Encryption Standard (AES-256)
  • Support Community Forums

Included Features

S3 API Compatibility
Docker & K8s Support
Basic Web UI
Standard Metrics
Note: Data Scrubbing and Disk Remapping are available in the Enterprise Edition.

Get Started

Deploy in seconds using Docker.

docker run -p 9000:9000 \
-v /data:/data \
cidnic/cidorbit:latest server /data

CIDOrbit Enterprise

Flagship

Enterprise-grade object storage for regulated and mission-critical environments. Run S3-compatible storage with security, durability, and operational control.

Why CIDOrbit Enterprise?

CIDOrbit Enterprise is built for organizations that require secure, sovereign, S3-compatible storage with an operational model suitable for regulated and mission-critical environments.

DURABILITY_MODEL
8+4 erasure coding
Designed to tolerate up to 4 disk failures with auto-heal
SECURITY_DEFAULTS
Zero auto-creation
Does not auto-create disk roots (enterprise-safe posture)
OPERATIONS
Server-side CLI
Copy/move/stat without re-downloading and re-uploading data

Enterprise Specifications

  • Reliability Engine Data Scrubber + Disk Remapping
  • Ransomware Protection Object Lock (WORM)
  • Security RBAC + AD/LDAP Integration
  • Encryption AES-256-GCM + External KMS
  • Replication Active-Active Multi-Site
  • Fault Tolerance 8+4 Erasure Coding (4-Disk Failure)
  • CLI Management Server-Side Operations
  • API Compatibility S3 v4 Signature + Presigned URLs
  • Support Enterprise Support Options

Enterprise Use Cases

Ransomware-Resilient Backup Infrastructure

Challenge: Backups must remain recoverable even if credentials are compromised.

Solution: Object Lock (WORM) retention + RBAC reduces blast radius and enforces immutable retention windows.

Outcome: Reduced ransomware recovery risk through policy-based immutability.

Media & Entertainment: 4K/8K Asset Storage

Challenge: Large assets must be previewed and processed without copying entire files.

Solution: HTTP Range / partial content enables efficient streaming and partial reads.

Outcome: Faster workflows with fewer redundant transfers.

Manufacturing: IoT Sensor Data Lake

Challenge: High-volume ingestion needs predictable performance and operational safety.

Solution: Connection management + rate limiting + bounded caching keeps ingest stable under concurrency spikes.

Outcome: Reduced incident rate caused by overload and contention.

Financial Services: Regulatory Compliance Archive

Challenge: Records must be retained, protected from tampering, and accessible during audits.

Solution: Object Lock (WORM) + RBAC + encryption at rest supports retention governance and separation of duties.

Outcome: Lower audit friction with enforceable policy controls.

Strategic Business Benefits

Active Data Scrubber

Automatically detects and heals silent bit-rot in background.

Benefit: Eliminates data corruption before it impacts operations.

Disk Remapping

Designed to support drive replacement workflows with minimal service disruption.

Benefit: Keep services available during hardware maintenance.

Ransomware Resilience

Object Lock (WORM) retention can help prevent deletion/overwrite during a defined retention window (subject to policy and configuration).

Benefit: Reduce ransomware blast radius and simplify recovery workflows.

Global Federation

Link clusters across continents for a single global namespace.

Benefit: Simplify multi-region operations with unified data view.

Server-side Operations

Server-side CLI operations can reduce unnecessary data movement across the network for bulk actions.

Benefit: Faster migrations and bulk workflows with less operational friction.

You Hold the Keys

External KMS integration means only you can decrypt your data.

Benefit: Data sovereignty via customer-controlled encryption keys.

Total Cost of Ownership Estimator

Use your numbers. Defaults below are examples—edit for your environment.

INPUTS
CLOUD
CIDORBIT ENTERPRISE
CLOUD_TOTAL
$
CIDORBIT_TOTAL
$
DELTA
$
Notes: This estimator supports planning conversations. Final economics vary by workload, durability requirements, and network patterns.

Enterprise Adoption Path

Designed for enterprise evaluation and rollout: align stakeholders, validate fit, and deploy with predictable operational ownership.

STEP_01
Architecture & Sizing
Workload goals, retention, durability, network patterns, and operational model.
STEP_02
Proof of Concept
Validate S3 compatibility, security controls, and lifecycle/replication behavior with your tooling.
STEP_03
Rollout & Operations
Runbooks, monitoring, and admin workflows aligned to your standards and change control.
CIO / IT
Predictable cost profile, portability, and clean integration with existing platforms.
CISO / Security
Encryption options, key control, WORM retention, and least-privilege access controls.
Finance / Procurement
Transparent sizing inputs, support plans, and a procurement-friendly evaluation path.

Talk to Sales

Custom pricing based on capacity.

Support is Online
CID-XS Edge Server hardware detail
Model: XS-2025

CID-XS Appliance

Edge Ready

High-performance edge storage designed for remote offices, branch locations, and distributed operations.

The CID-XS is engineered for "Store at the Edge" workflows. Perfect for retail locations, branch offices, manufacturing floors, or any distributed environment where you need local S3 storage with enterprise-grade reliability that seamlessly replicates to headquarters or cloud.

Why Purchase CID-XS?

  • Eliminate WAN Dependency: Local storage means operations continue during internet outages
  • Reduce Cloud Costs: Stop paying egress fees—only sync deltas to cloud
  • Turnkey Deployment: Pre-configured CIDOrbit Enterprise—just power on and provision
  • Compact Footprint: Fits in IT closets with limited space—no rack required

Hardware Specifications

Form Factor 1U Half-Depth
Capacity Up to 64TB Raw
CPU AMD EPYC Embedded
Network 2x 10GbE SFP+
Memory 64GB ECC DDR4
Power Single 450W Platinum
Support Online

CID-XS Use Cases & Benefits

Retail: Point-of-Sale Transaction Storage

Scenario: Stores and branches need local capture for POS, operational files, or video—without being blocked by WAN outages.

CID-XS Solution: Each store gets a CID-XS that caches transactions locally and auto-syncs to headquarters when bandwidth is available. Stores remain operational during WAN failures.

Outcome: Local continuity at the edge with controlled synchronization to central systems.

Manufacturing: Factory Floor Data Collection

Scenario: A site needs to ingest high-volume data locally for immediate processing while syncing selected data upstream.

CID-XS Solution: Installed on factory floor, CID-XS ingests microscope images via S3 API. ML pipelines analyze images locally with <10ms latency. Archive to HQ nightly.

Outcome: Low-latency local processing without waiting on cloud transfer.

Healthcare: Medical Imaging at Clinics

Scenario: Clinics and remote teams need fast local access to large files while maintaining centralized governance.

CID-XS Solution: Each clinic's PACS system writes DICOM images to CID-XS. Encrypted at rest (AES-256). Replicates to central hospital data center for long-term archive.

Outcome: Local responsiveness with encrypted storage and centralized control.

Oil & Gas: Remote Site Operations

Scenario: Remote sites ingest data continuously but have intermittent or expensive connectivity.

CID-XS Solution: CID-XS buffers data locally during offline periods. When satellite link is up, automatically syncs critical alerts first, then historical data—all compressed and encrypted.

Outcome: Local buffering with controlled synchronization when links are available.
CID-X1 Rack Server hardware detail
Model: X1-GEN4

CID-X1 Data Center

Petabyte-scale density.

The CID-X1 is our flagship high-density storage server. Optimized for the CIDOrbit erasure coding engine (8+4), it delivers maximum durability with minimal overhead.

Hardware Specifications

Form Factor 4U Rackmount (60/90 Bays)
Capacity Up to 1.8PB Raw
CPU Dual AMD EPYC 9004
Network 4x 100GbE QSFP28
Memory 512GB ECC DDR5
Power 1+1 Redundant 1600W

Enterprise-Ready Options

Available with CIDOrbit Enterprise pre-installed and support plans aligned to your operational requirements.

Support Online

Security & Governance

Designed for sensitive data with encryption at rest, TLS in transit, and S3-compatible controls including Object Lock (WORM) for immutable retention workflows.

Durability at Scale

Optimized for erasure coding (8+4) with resilience features like auto-heal and degraded-mode behavior—built for environments where data must stay online.

Operations-First

Fits into standard S3 tooling and enterprise workflows. Control provisioning, access, and lifecycle policies without forcing application rewrites.

Enterprise Use Cases

CID-X1 combines high-density enterprise hardware with CIDOrbit’s S3 (Amazon Simple Storage Service) API–compatible object storage to help teams control cost, reduce operational risk, and modernize data workflows without forcing application rewrites. Below are the most common ways organizations deploy CID-X1 in regulated and mission-critical environments.

Executive impact: Lower total cost

Keep data on-prem to avoid unpredictable public-cloud egress and tiering fees while still using S3-native workflows.

  • High density per rack unit to optimize space and power planning
  • Standardized platform reduces integration and lifecycle complexity
  • Predictable procurement and capacity expansion model
Executive impact: Reduce risk

Design for ransomware resilience, retention requirements, and business continuity—without depending on a single external control plane.

  • Object Lock with WORM (Write Once, Read Many) retention workflows
  • Encryption at rest and TLS in transit for sensitive datasets
  • Replication options to support DR (Disaster Recovery) readiness
Executive impact: Faster time-to-value

Turnkey hardware simplifies deployment and accelerates adoption across multiple teams and business units.

  • Validated appliance approach for repeatable rollouts
  • Support plans aligned to operational requirements
  • Accelerates consolidation of file, backup, and archive workflows
For technical teams: Integration-first

Adopt object storage using existing S3 tools, SDKs, and backup applications—minimizing change management.

  • S3 API compatibility for common enterprise tooling
  • RBAC (Role-Based Access Control) for multi-team governance
  • Lifecycle and policy-driven controls for predictable operations
For technical teams: Performance & efficiency

High-density architecture and high-bandwidth networking are designed for sustained ingest and large-object workloads.

  • 4× 100GbE connectivity for data center-scale pipelines
  • ECC memory and redundant power for reliability
  • Erasure coding (8+4) optimized for durability with reduced overhead
For technical teams: Operational readiness

Deploy in enterprise patterns with observability, automation, and resilience expectations built into the design.

  • Multi-site replication for continuity and DR workflows
  • Auto-heal and degraded-mode behavior for resilience under failure
  • Operational utilities such as data scrubbing and disk remapping (Enterprise)
Common deployment patterns
Ransomware-Resistant Backup Vault

Use Object Lock with WORM retention to help prevent backup deletion or overwrite, while keeping vaults on-prem and compatible with S3-aware backup tooling.

  • Immutable retention policies to support audit and recovery goals
  • Segmentation and access control using RBAC
Private S3 for Analytics & AI

Centralize unstructured data for analytics pipelines and AI training sets with predictable performance, on-prem governance, and simplified data sharing across teams.

  • High-throughput ingest for large-object and batch workloads
  • Policy-driven access patterns for multi-tenant environments
Multi-Site Archive & DR

Replicate between data centers to support archive durability and DR (Disaster Recovery) objectives, keeping critical datasets accessible even during partial site outages.

  • Cross-site replication for continuity planning
  • Supports staged recovery workflows and controlled rehydration
Compliance-Driven Retention

Implement retention, immutability, and audit-friendly controls for regulated data without relying on a single public cloud provider for policy enforcement.

  • Encryption, TLS, and governance controls for sensitive workloads
  • Retention policies aligned to internal and regulatory requirements

CIDOrbit Core

High-performance, distributed object storage compatible with Amazon S3 APIs.

Up to 500+
MB/s Throughput (Typical)
~<10ms
Latency (P95, Typical)

Performance varies by hardware, network, drive/media type, and workload. Contact us for sizing guidance.

Enterprise Security & Compliance

Ransomware Protection

Object Lock (WORM): Make your data immutable. Write Once, Read Many protection ensures that backup data cannot be deleted or overwritten by ransomware or malicious actors for a set retention period.

S3 Object Lock Compatible

Advanced Encryption

AES-256-GCM envelope encryption is standard. We support external Key Management Systems (KMS) for centralized control.

  • Native Local Key Vault
  • HashiCorp Vault Integration
  • AWS KMS Support

Identity & Access (RBAC)

Granular Role-Based Access Control allows you to define precise permissions. Integrate with your existing LDAP/AD providers for seamless authentication.

POLICY: Allow s3:PutObject on /finance/*

Data Management & Multi-Cloud

Lifecycle Management

Automate your data cost optimization. Set policies to automatically transition older data to cheaper storage tiers or expire data after a set retention period to meet compliance (GDPR/HIPAA).

Active Replication

Ensure high availability with async active-active replication. Replicate buckets across different racks, data centers, or geographic regions for disaster recovery.

Multi-Cloud Tiering

Don't be an island. Seamlessly tier or back up your data to public cloud providers while keeping your hot data local.

Core Storage Engine

Erasure Coding (8+4)

More resilient than RAID. We split data into 8 data shards and 4 parity shards. You can lose any 4 disks simultaneously and lose zero data.

Active Data Scrubber

Silent bit-rot is detected and healed automatically in the background. Your data integrity is constantly verified.

Disk Remapping

Gracefully handles disk path changes during replacement or migration without downtime.

The Privacy Manifesto

Last Updated: Dec 20, 2025 // v1.0

At CIDNIC, we believe that data is an extension of the self or the sovereign entity. It should not be mined, harvested, or held hostage.

1. No Vendor Lock-in

Your data should not be trapped in a proprietary format. CIDOrbit uses standard object storage paradigms and open API standards (S3). We prioritize portability: if you leave, your applications can continue to speak S3, and your data remains accessible through standard object workflows.

2. You Hold the Keys

We implement LocalKMS and Envelope Encryption. This means the master keys for your data reside on your infrastructure, under your control. When configured with customer-managed keys, CIDNIC does not possess the keys required to decrypt your data at rest. Support processes should not require access to your keys.

3. Zero Telemetry by Default

Modern software often "phones home." CIDOrbit is designed to run in air-gapped environments. CIDOrbit does not require telemetry to operate. Optional diagnostics can be enabled for support scenarios when you choose.

4. Accessible Technology

We are building a business, not a walled garden. Our community edition is free forever. Our enterprise features are paid, but our commitment to providing accessible, high-performance storage remains the bedrock of our innovation.

Questions about our stance?

We encourage security researchers and privacy advocates to audit our claims.

privacy@cidnic.com

API Documentation

S3-compatible object storage APIs

CIDOrbit is designed to integrate with existing S3 tooling and applications. For detailed endpoint coverage, supported headers, and implementation notes, request the full documentation package.

What We Support

  • Amazon S3-style APIs with SigV4 request signing
  • Presigned URLs for time-bound access workflows
  • Object Lock (WORM) retention patterns for immutable storage
  • Encryption-at-rest options and TLS for data-in-transit

Need implementation guidance?

We can provide reference configurations, sizing guidance, and an integration walkthrough aligned to your tools.

About CIDNIC

Engineering-led infrastructure

CIDNIC builds private, S3-compatible object storage for organizations that need durability, security controls, and operational ownership. Our focus is practical engineering: predictable operations, clear integration paths, and security-first design.

Principles

  • Portability: Integrate with standard S3 workflows to reduce lock-in risk.
  • Sovereignty: Keep data and keys under your governance model.
  • Resilience: Design for failure modes: disks fail, networks flap, workloads surge.

Want to talk architecture?

Share your workload goals and constraints—our team will propose a deployment model and sizing approach.

Terms of Service

Website & evaluation terms (summary)

This website is provided for informational purposes. Product, licensing, and support terms are defined in the applicable commercial agreement executed between CIDNIC and the customer.

Summary

  • No warranties are made on this website content; specifications may change.
  • Evaluation, licensing, and support obligations are governed by contract documents.
  • Contact us to receive the current Terms for your procurement process.

Need the latest contractual Terms?

We can provide procurement-ready documents and respond to security/vendor questionnaires.

Service Level Agreement (SLA)

Support options (overview)

SLA terms vary by plan and are defined in the commercial agreement. We align support coverage, response targets, and escalation paths to your operational requirements.

Typical Inputs

  • Coverage windows (business hours vs. 24x7)
  • Severity definitions and response targets
  • Escalation and communications plan
  • Hardware replacement and spares model (appliances)

Want an SLA aligned to your operations?

We’ll map your environment and propose support coverage options for review.

Open Source Licenses

Third-party components used on this website

This website uses third-party open source libraries for styling and interactivity. Please refer to the upstream projects for license details.

Need a complete bill of materials?

We can provide a list of website dependencies and versions used in production.

Start the Conversation

We are driven by engineering excellence and a steadfast commitment to data sovereignty. Our solutions are architected for intelligence and resilience. Let's discuss your storage challenges.

Lab & HQ

123 Innovation Drive
Tech District, CA 94025

Direct Contact

engineering@cidnic.com
sales@cidnic.com