Your Data.
Under Your Control.
CIDNIC builds S3-compatible storage software and appliances for organizations that require security, governance, and operational ownership—without defaulting to a single public cloud control plane.
Enterprise Snapshot
An appliances-first object storage platform engineered for enterprise realities: procurement-ready deployments, predictable operations, and S3-compatible integration for modern workloads.
CID-X1 Data Center
High-density, enterprise storage appliance optimized for CIDOrbit Enterprise—built for predictable scale, resilient operations, and procurement-aligned deployments.
CIO / IT
Standardize on validated appliances for repeatable rollouts, then extend with software deployments where you need flexibility—without breaking S3 tooling or pipelines.
CISO / Security
Hardened controls for regulated data: TLS in transit, encryption at rest, RBAC, and immutable retention patterns with Object Lock (WORM) to strengthen ransomware posture.
Finance / Procurement
Procurement-friendly options with clear sizing inputs, support tiers, and a structured evaluation path—built for predictable budgeting and long-term operational ownership.
The Ecosystem
Start with appliances for standardized deployments, then extend with software editions and enterprise utilities—built to integrate with the tools your teams already use.
CID-XS Appliance
Compact edge and ROBO appliance for standardized remote deployments with the same S3-compatible workflow.
CIDOrbit Enterprise
Governance and resilience features for regulated environments—Object Lock (WORM), RBAC, replication, and enterprise support options.
Just Data Copier (JDC)
Enterprise-grade file transfer utility with resume, verification, tuning, and operational observability—designed to fit existing workflows.
CIDOrbit Community
A free entry point for developers and labs—S3-compatible on a single node to evaluate workflows before scaling.
Engineering with Principles
We don't chase trends. We build solid foundations for the next decade of data storage.
Sovereign by Design
Run storage on infrastructure you control. Telemetry is optional. Key management is designed for customer governance via LocalKMS and external KMS options.
Open Standards
We believe in avoiding vendor lock-in. While our engine is proprietary, we prioritize open API standards (S3) so your applications remain portable.
Privacy First
Privacy isn't a setting; it's architecture. From encryption-at-rest to strict access controls, we engineer for high-assurance environments.
Product Lineup
CIDNIC’s CIDOrbit platform delivers Amazon S3 API–compatible object storage for organizations that need predictable performance, strong governance controls, and deployment flexibility across edge and data center environments.
Choose the model that matches your operating requirements: software editions for integration into existing infrastructure and automation, or turnkey hardware appliances for standardized procurement, repeatable rollouts, and consistent operations.
- Application portability with S3 API compatibility
- Governance controls such as RBAC (Role-Based Access Control)
- Immutability options like Object Lock with WORM (Write Once, Read Many)
- Edge and ROBO (Remote Office / Branch Office) deployment support
Hardware Appliances
CID-XS Appliance
Edge & ROBO
Compact, quiet, and powerful. Designed for remote offices and edge computing where space is at a premium but reliability is non-negotiable.
CID-X1 Data Center
Data Center Series
High-density 4U rackmount storage server. Massive capacity, dual-redundant architecture, and NVMe acceleration for enterprise workloads.
Software Editions
CIDOrbit Community
Free Forever
The entry point to our technology. Perfect for developers, home labs, and single-node workloads. Full S3 compatibility included.
CIDOrbit Enterprise
Commercial License
For regulated and mission-critical environments. Includes data scrubbing, disk remapping, Object Lock (WORM), RBAC, multi-site replication, and enterprise support options.
Enterprise Utilities
Just Data Copier (JDC)
Free Enterprise Utility
A high-performance, enterprise-grade network file transfer utility designed for mission-critical environments. Features adaptive network optimization, resume capability, and smart hash verification.
Just Data Copier
Free UtilityHigh-performance, enterprise-grade network file transfer utility designed for mission-critical environments.
Technical Specifications
- License MIT / Free
- Throughput Optimized Parallel Processing (2TB+ chunks)
- Security TLS/SSL Encryption + Token Auth
- Integrity Smart Hash (Auto MD5 / BLAKE2b)
- Observability Prometheus Metrics + Health Checks
Download Now
Single binary. No dependencies.
Docker Pull:
Key Features
Smart Hash Verification
Auto-selects optimized hashing for large files (e.g., BLAKE2b) to improve verification efficiency in real-world transfer workloads.
Resilient Resume
Chunk-level resume helps avoid restarting large transfers from scratch after interruptions.
Adaptive Network
Real-time profiling of RTT and packet loss to automatically tune window sizes.
Batch Processing
Supports wildcard patterns for mass transfer of logs, backups, and data sets.
Use Cases
Enterprise Benefits (Built to Fit Existing Workflows)
JDC is a single-binary utility designed to drop into established runbooks and automation. Use it interactively for first-time setup, or run it headless with flags/YAML for repeatable transfers.
- Single binary; no runtime dependencies
- CLI flags + YAML configuration (flags override config)
- Dry-run mode to validate changes before production
Move files from MB to TB+ efficiently with parallel chunking, resumable transfers, and optional verification. Adaptive network tuning helps sustain throughput across diverse network conditions.
- Chunk-level resume with integrity checks
- Optional hash verification (disabled by default)
- Adaptive tuning based on RTT (round-trip time) and packet loss
Quick Start (Client / Server)
Run JDC as a receiver on the target host, specifying an output directory and (optionally) a listen address/port.
Send from client to server over the network. Use optional compression where it makes sense for your data types and link.
Interactive setup walks you through mode selection, performance presets, and security options.
Configuration, Batch Transfers, and Change Control
Generate templates, review settings in version control, and reuse consistent transfer profiles across teams and environments.
Move sets of files using comma-separated lists or wildcards—ideal for logs, daily backups, and staged migrations.
Validate configuration and workflow changes without actual file I/O—useful for approvals and change windows.
Security, Verification, and Performance Tuning
- TLS/SSL encryption with token authentication
- Path validation to help prevent directory traversal
- Privacy-focused logging (no sensitive paths or hash values)
- Resource limits: connections, memory, and bandwidth controls
Hash verification is disabled by default. When enabled, JDC negotiates an optimized algorithm (MD5 for <50GB; BLAKE2b for ≥50GB).
Observability (Prometheus Metrics + Health Endpoints)
JDC exposes Prometheus-compatible metrics and Kubernetes-style health endpoints so operations teams can monitor throughput, error rates, resource usage, and service readiness without custom instrumentation.
bytes, duration, active transfers
latency, bandwidth, errors
memory, connections, open files
Common Options (Operational Cheatsheet)
Enable optional hash verification (client and server).
Compression with file-type awareness.
Parallelism (default: ~half CPU cores).
Transfer chunking and buffering controls.
Adaptive network optimization (RTT/packet loss).
Validate configuration without file I/O.
CIDOrbit Community Edition
Distributed object storage for single-node deployments.
Specifications
- License Free Community License
- Max Nodes 1 (Single Server)
- Erasure Coding Fixed (8+4)
- Encryption Standard (AES-256)
- Support Community Forums
Included Features
Get Started
Deploy in seconds using Docker.
-v /data:/data \
cidnic/cidorbit:latest server /data
CIDOrbit Enterprise
FlagshipEnterprise-grade object storage for regulated and mission-critical environments. Run S3-compatible storage with security, durability, and operational control.
Why CIDOrbit Enterprise?
CIDOrbit Enterprise is built for organizations that require secure, sovereign, S3-compatible storage with an operational model suitable for regulated and mission-critical environments.
Enterprise Specifications
- Reliability Engine Data Scrubber + Disk Remapping
- Ransomware Protection Object Lock (WORM)
- Security RBAC + AD/LDAP Integration
- Encryption AES-256-GCM + External KMS
- Replication Active-Active Multi-Site
- Fault Tolerance 8+4 Erasure Coding (4-Disk Failure)
- CLI Management Server-Side Operations
- API Compatibility S3 v4 Signature + Presigned URLs
- Support Enterprise Support Options
Enterprise Use Cases
Ransomware-Resilient Backup Infrastructure
Challenge: Backups must remain recoverable even if credentials are compromised.
Solution: Object Lock (WORM) retention + RBAC reduces blast radius and enforces immutable retention windows.
Media & Entertainment: 4K/8K Asset Storage
Challenge: Large assets must be previewed and processed without copying entire files.
Solution: HTTP Range / partial content enables efficient streaming and partial reads.
Manufacturing: IoT Sensor Data Lake
Challenge: High-volume ingestion needs predictable performance and operational safety.
Solution: Connection management + rate limiting + bounded caching keeps ingest stable under concurrency spikes.
Financial Services: Regulatory Compliance Archive
Challenge: Records must be retained, protected from tampering, and accessible during audits.
Solution: Object Lock (WORM) + RBAC + encryption at rest supports retention governance and separation of duties.
Strategic Business Benefits
Active Data Scrubber
Automatically detects and heals silent bit-rot in background.
Benefit: Eliminates data corruption before it impacts operations.
Disk Remapping
Designed to support drive replacement workflows with minimal service disruption.
Benefit: Keep services available during hardware maintenance.
Ransomware Resilience
Object Lock (WORM) retention can help prevent deletion/overwrite during a defined retention window (subject to policy and configuration).
Benefit: Reduce ransomware blast radius and simplify recovery workflows.
Global Federation
Link clusters across continents for a single global namespace.
Benefit: Simplify multi-region operations with unified data view.
Server-side Operations
Server-side CLI operations can reduce unnecessary data movement across the network for bulk actions.
Benefit: Faster migrations and bulk workflows with less operational friction.
You Hold the Keys
External KMS integration means only you can decrypt your data.
Benefit: Data sovereignty via customer-controlled encryption keys.
Total Cost of Ownership Estimator
Use your numbers. Defaults below are examples—edit for your environment.
Enterprise Adoption Path
Designed for enterprise evaluation and rollout: align stakeholders, validate fit, and deploy with predictable operational ownership.
Talk to Sales
Custom pricing based on capacity.
CID-XS Appliance
Edge ReadyHigh-performance edge storage designed for remote offices, branch locations, and distributed operations.
The CID-XS is engineered for "Store at the Edge" workflows. Perfect for retail locations, branch offices, manufacturing floors, or any distributed environment where you need local S3 storage with enterprise-grade reliability that seamlessly replicates to headquarters or cloud.
Why Purchase CID-XS?
- Eliminate WAN Dependency: Local storage means operations continue during internet outages
- Reduce Cloud Costs: Stop paying egress fees—only sync deltas to cloud
- Turnkey Deployment: Pre-configured CIDOrbit Enterprise—just power on and provision
- Compact Footprint: Fits in IT closets with limited space—no rack required
Hardware Specifications
CID-XS Use Cases & Benefits
Retail: Point-of-Sale Transaction Storage
Scenario: Stores and branches need local capture for POS, operational files, or video—without being blocked by WAN outages.
CID-XS Solution: Each store gets a CID-XS that caches transactions locally and auto-syncs to headquarters when bandwidth is available. Stores remain operational during WAN failures.
Manufacturing: Factory Floor Data Collection
Scenario: A site needs to ingest high-volume data locally for immediate processing while syncing selected data upstream.
CID-XS Solution: Installed on factory floor, CID-XS ingests microscope images via S3 API. ML pipelines analyze images locally with <10ms latency. Archive to HQ nightly.
Healthcare: Medical Imaging at Clinics
Scenario: Clinics and remote teams need fast local access to large files while maintaining centralized governance.
CID-XS Solution: Each clinic's PACS system writes DICOM images to CID-XS. Encrypted at rest (AES-256). Replicates to central hospital data center for long-term archive.
Oil & Gas: Remote Site Operations
Scenario: Remote sites ingest data continuously but have intermittent or expensive connectivity.
CID-XS Solution: CID-XS buffers data locally during offline periods. When satellite link is up, automatically syncs critical alerts first, then historical data—all compressed and encrypted.
CID-X1 Data Center
Petabyte-scale density.
The CID-X1 is our flagship high-density storage server. Optimized for the CIDOrbit erasure coding engine (8+4), it delivers maximum durability with minimal overhead.
Hardware Specifications
Enterprise-Ready Options
Available with CIDOrbit Enterprise pre-installed and support plans aligned to your operational requirements.
Security & Governance
Designed for sensitive data with encryption at rest, TLS in transit, and S3-compatible controls including Object Lock (WORM) for immutable retention workflows.
Durability at Scale
Optimized for erasure coding (8+4) with resilience features like auto-heal and degraded-mode behavior—built for environments where data must stay online.
Operations-First
Fits into standard S3 tooling and enterprise workflows. Control provisioning, access, and lifecycle policies without forcing application rewrites.
Enterprise Use Cases
CID-X1 combines high-density enterprise hardware with CIDOrbit’s S3 (Amazon Simple Storage Service) API–compatible object storage to help teams control cost, reduce operational risk, and modernize data workflows without forcing application rewrites. Below are the most common ways organizations deploy CID-X1 in regulated and mission-critical environments.
Keep data on-prem to avoid unpredictable public-cloud egress and tiering fees while still using S3-native workflows.
- High density per rack unit to optimize space and power planning
- Standardized platform reduces integration and lifecycle complexity
- Predictable procurement and capacity expansion model
Design for ransomware resilience, retention requirements, and business continuity—without depending on a single external control plane.
- Object Lock with WORM (Write Once, Read Many) retention workflows
- Encryption at rest and TLS in transit for sensitive datasets
- Replication options to support DR (Disaster Recovery) readiness
Turnkey hardware simplifies deployment and accelerates adoption across multiple teams and business units.
- Validated appliance approach for repeatable rollouts
- Support plans aligned to operational requirements
- Accelerates consolidation of file, backup, and archive workflows
Adopt object storage using existing S3 tools, SDKs, and backup applications—minimizing change management.
- S3 API compatibility for common enterprise tooling
- RBAC (Role-Based Access Control) for multi-team governance
- Lifecycle and policy-driven controls for predictable operations
High-density architecture and high-bandwidth networking are designed for sustained ingest and large-object workloads.
- 4× 100GbE connectivity for data center-scale pipelines
- ECC memory and redundant power for reliability
- Erasure coding (8+4) optimized for durability with reduced overhead
Deploy in enterprise patterns with observability, automation, and resilience expectations built into the design.
- Multi-site replication for continuity and DR workflows
- Auto-heal and degraded-mode behavior for resilience under failure
- Operational utilities such as data scrubbing and disk remapping (Enterprise)
Use Object Lock with WORM retention to help prevent backup deletion or overwrite, while keeping vaults on-prem and compatible with S3-aware backup tooling.
- Immutable retention policies to support audit and recovery goals
- Segmentation and access control using RBAC
Centralize unstructured data for analytics pipelines and AI training sets with predictable performance, on-prem governance, and simplified data sharing across teams.
- High-throughput ingest for large-object and batch workloads
- Policy-driven access patterns for multi-tenant environments
Replicate between data centers to support archive durability and DR (Disaster Recovery) objectives, keeping critical datasets accessible even during partial site outages.
- Cross-site replication for continuity planning
- Supports staged recovery workflows and controlled rehydration
Implement retention, immutability, and audit-friendly controls for regulated data without relying on a single public cloud provider for policy enforcement.
- Encryption, TLS, and governance controls for sensitive workloads
- Retention policies aligned to internal and regulatory requirements
CIDOrbit Core
High-performance, distributed object storage compatible with Amazon S3 APIs.
Performance varies by hardware, network, drive/media type, and workload. Contact us for sizing guidance.
Enterprise Security & Compliance
Ransomware Protection
Object Lock (WORM): Make your data immutable. Write Once, Read Many protection ensures that backup data cannot be deleted or overwritten by ransomware or malicious actors for a set retention period.
S3 Object Lock CompatibleAdvanced Encryption
AES-256-GCM envelope encryption is standard. We support external Key Management Systems (KMS) for centralized control.
- Native Local Key Vault
- HashiCorp Vault Integration
- AWS KMS Support
Identity & Access (RBAC)
Granular Role-Based Access Control allows you to define precise permissions. Integrate with your existing LDAP/AD providers for seamless authentication.
POLICY: Allow s3:PutObject on /finance/*Data Management & Multi-Cloud
Lifecycle Management
Automate your data cost optimization. Set policies to automatically transition older data to cheaper storage tiers or expire data after a set retention period to meet compliance (GDPR/HIPAA).
Active Replication
Ensure high availability with async active-active replication. Replicate buckets across different racks, data centers, or geographic regions for disaster recovery.
Multi-Cloud Tiering
Don't be an island. Seamlessly tier or back up your data to public cloud providers while keeping your hot data local.
Core Storage Engine
Erasure Coding (8+4)
More resilient than RAID. We split data into 8 data shards and 4 parity shards. You can lose any 4 disks simultaneously and lose zero data.
Active Data Scrubber
Silent bit-rot is detected and healed automatically in the background. Your data integrity is constantly verified.
Disk Remapping
Gracefully handles disk path changes during replacement or migration without downtime.
The Privacy Manifesto
Last Updated: Dec 20, 2025 // v1.0
At CIDNIC, we believe that data is an extension of the self or the sovereign entity. It should not be mined, harvested, or held hostage.
1. No Vendor Lock-in
Your data should not be trapped in a proprietary format. CIDOrbit uses standard object storage paradigms and open API standards (S3). We prioritize portability: if you leave, your applications can continue to speak S3, and your data remains accessible through standard object workflows.
2. You Hold the Keys
We implement LocalKMS and Envelope Encryption. This means the master keys for your data reside on your infrastructure, under your control. When configured with customer-managed keys, CIDNIC does not possess the keys required to decrypt your data at rest. Support processes should not require access to your keys.
3. Zero Telemetry by Default
Modern software often "phones home." CIDOrbit is designed to run in air-gapped environments. CIDOrbit does not require telemetry to operate. Optional diagnostics can be enabled for support scenarios when you choose.
4. Accessible Technology
We are building a business, not a walled garden. Our community edition is free forever. Our enterprise features are paid, but our commitment to providing accessible, high-performance storage remains the bedrock of our innovation.
Questions about our stance?
We encourage security researchers and privacy advocates to audit our claims.
privacy@cidnic.comAPI Documentation
S3-compatible object storage APIs
CIDOrbit is designed to integrate with existing S3 tooling and applications. For detailed endpoint coverage, supported headers, and implementation notes, request the full documentation package.
What We Support
- Amazon S3-style APIs with SigV4 request signing
- Presigned URLs for time-bound access workflows
- Object Lock (WORM) retention patterns for immutable storage
- Encryption-at-rest options and TLS for data-in-transit
Need implementation guidance?
We can provide reference configurations, sizing guidance, and an integration walkthrough aligned to your tools.
About CIDNIC
Engineering-led infrastructure
CIDNIC builds private, S3-compatible object storage for organizations that need durability, security controls, and operational ownership. Our focus is practical engineering: predictable operations, clear integration paths, and security-first design.
Principles
- Portability: Integrate with standard S3 workflows to reduce lock-in risk.
- Sovereignty: Keep data and keys under your governance model.
- Resilience: Design for failure modes: disks fail, networks flap, workloads surge.
Want to talk architecture?
Share your workload goals and constraints—our team will propose a deployment model and sizing approach.
Terms of Service
Website & evaluation terms (summary)
This website is provided for informational purposes. Product, licensing, and support terms are defined in the applicable commercial agreement executed between CIDNIC and the customer.
Summary
- No warranties are made on this website content; specifications may change.
- Evaluation, licensing, and support obligations are governed by contract documents.
- Contact us to receive the current Terms for your procurement process.
Need the latest contractual Terms?
We can provide procurement-ready documents and respond to security/vendor questionnaires.
Service Level Agreement (SLA)
Support options (overview)
SLA terms vary by plan and are defined in the commercial agreement. We align support coverage, response targets, and escalation paths to your operational requirements.
Typical Inputs
- Coverage windows (business hours vs. 24x7)
- Severity definitions and response targets
- Escalation and communications plan
- Hardware replacement and spares model (appliances)
Want an SLA aligned to your operations?
We’ll map your environment and propose support coverage options for review.
Open Source Licenses
Third-party components used on this website
This website uses third-party open source libraries for styling and interactivity. Please refer to the upstream projects for license details.
Need a complete bill of materials?
We can provide a list of website dependencies and versions used in production.
Start the Conversation
We are driven by engineering excellence and a steadfast commitment to data sovereignty. Our solutions are architected for intelligence and resilience. Let's discuss your storage challenges.
Lab & HQ
123 Innovation Drive
Tech District, CA 94025
Direct Contact
engineering@cidnic.com
sales@cidnic.com