Frequently Asked Questions

Cypherpath has compiled a list of questions often asked by customers and those new to Cypherpath SDI OS™. If you don't see your question here please feel free to submit it to info@cypherpath.com and we will respond as quickly as possible.

What hardware requirements does Cypherpath have?
Cypherpath installs to x86 VT-x/AMD-V hardware and requires at least 4GB of RAM. The more RAM available the larger each cyber environment can be.
None, Cypherpath is its own operating system. Installation begins directly on the metal with a Cypherpath SDI OS install iso.
Multiple, you can create as large a cyber environment as you want that is composed of several vm's, operating systems, networks, and applications containing both commercial and open source tools.
Yes, Cisco CSR, Arista vEOS, and other vendor solutions can run inside Cypherpath SDIs. As long as the solution can run on x86 Hardware it can be leveraged inside Cypherpath.
They work well with Cypherpath since Cypherpath provides cyber environments users can place VM's, or run apps in an app container within Cypherpath cyber environments. This provides cyber resources beyond just virtual machines and app containers including software-defined storage and network resources. Delivering a complete portable and repeatable holistic segmented cyber evironment.
Cypherpath provides orchestration and isolation of cyber environments and automation of the networks. What solutions are provided in each cyber environment is up to the end user. This means you could use any tool that you prefer such as, Chef, Puppet, Ansible, or others.
Cypherpath can be used as a private, hybrid or public cloud since it is remotely accessible. To make a Cypherpath deployment a private/hybrid/public cloud the web interface just needs to be reachable via the desired IP address.
Processors types other than x86 can be run inside a Cypherpath environment by leveraging tools such as QEMU to emulate the hardware which does require a performance hit.
No, Cypherpath provides visibility into the underlying CPU consumption of each node in the cluster and leaves the CPU quota allocation up to the end users needs to support different environments.
No, state will remain when persistence is enabled (default) but if you want to lose state to return to a pristine environment you can disable persistence or reload an older SDI checkpoint.
Cypherpath uses a distributed architecture that supports large scale deployments by simply adding additional servers as needed. Cypherpath can install to one server or scale to thousands.