Cypherpath SDI OS

The enterprise cyber resiliency and risk mitigation platform.

Build, Operate, and Deploy Resilient
Cyber Environments Anywhere.

Cypherpath SDI OS is a single distributed software OS that abstracts IT infrastructure and applications into portable self-contained software defined cyber environments (SDIs). SDIs take resiliency to a whole new level by making cyber environments, safer, more reliable, mobile, and cheaper to operate.

    Broad Ecosystem

    Leverage a broad ecosystem that includes thousands of technologies covering the entire IT stack. Run existing and emerging technologies and threats.

    Automation

    Transparently distribute and automate cyber environments through intelligent resource pooling. Deploy a holistic environment with a single click.

    High Availability

    Scale as needed by adding additional servers. Stay operational with automated failovers, recoveries, and live backups.

    Run Everywhere

    Build once and run everywhere with reliability. SDIs are stored and executed as digital files. SDI OS runs in the data center, lab, cloud, or edge.

Explore SDI OS

Access
Control

Restrict access based on users and system capabilities. Reduce the attack surface.

Learn More

Adaptive
Response

Optimize your ability to respond in a timely and appropriate manner to adverse conditions.

Learn More

Analytical
Monitoring

Maximize your ability to detect potential adverse conditions. Reveal their extent.

Learn More

Coordinated
Protection

Require an adversary to overcome multiple safeguards. Use defense-in-depth.

Learn More

Deception
 

Mislead and confuse your adversaries to hide critical assets. Expose covertly tainted assets.

Learn More

Dynamic
Positioning

Impede an adversary's ability to locate, eliminate, or corrupt mission or business assets.

Learn More

Dynamic
Representation

Support situational awareness. Reveal patterns or trends in adversary behavior.

Learn More

Persistence
 

Only deploy and keep resources as needed and for a limited time. Curtail an adversary's intrusion.

Learn More

Redundancy
 

Provide multiple instances of critical resources. Mitigate loss of information or services.

Learn More

Segmentation
 

Limit possible targets. Define and separate system elements based on criticality and trustworthiness.

Learn More

Access Control

One Cluster, Multiple Tenancies & Users

Create, configure, and manage SDIs with multiple tenancies and users while maintaining control and isolation across resources. Control quotas and physical resource allocations across the system. SDI OS includes builtin active directory and LDAP support. Securely integrate with other systems using SDI OS's RESTful API and token authentication.


Communications Management

All communication between SDI OS services and nodes are automatically encrypted and secured. SDI definitions are also encrypted and safeguarded. Cypherpath follows best security practices and builds security into the development process using evaluation programs to ensure compliance.


Identity & Access Management

Authenticate users with SSL communications along with hardware lockdown requiring username/password to proceed. Leverage high fidelity access control and builtin identity management or integrate with external providers. Securely communicate via RESTful API while maintaining access control and encryption.


Role Based Access Control

Provide security based on user, role, and SDI permissions. Add, modify, and remove users in the system. Assign users to specific groups and control access permissions such as SDI, network, storage, and sharing controls. Authenticate users with SSL communications along with hardware lockdown requiring username/password to proceed.

Adaptive Response

Today's & Tomorrow's Environments

SDIs give you the flexibility to run existing and emerging technologies and threats everywhere with a single click. Rollout new resilient cyber environments and projects faster including: services, labs, cyber ranges, and IoT.


Intelligent Resource Pooling

Start with one server or combine multiple servers into a single giant computer that can manage thousands of users and power any cyber environment as a service. Get the benefit of bare metal network speeds, line rates, intelligent placement, and hardware acceleration.


Universal Environment Runtime

Run VMs, containers, networks, and ISV tools with reliability. Operate cyber environments at a higher level, no need to worry about hypervisors, vm placement, or network configurations, SDI OS automatically handles those details and optimizes execution based on each environment everywhere you deploy your SDIs.


Sharing & Collaboration

Share SDIs and environment resources with other users and groups. Rapidly create new SDIs or modify existing SDIs by working together as a team. Visually see users configuring components in SDIs you have shared with them. Modularly compose SDIs and share their networks with users and groups providing extreme resource utilization and isolation.

Analytic Monitoring

Easily monitor SDIs including machines, networking, storage, and security with out of the box orchestration and integrations with third party tools.

Dashboards, Reports, & Metrics

SDI visibility, system performance metrics, and real-time reports of resource and user consumption. Always know the performance of the system and scale it up or down accordingly. Analyze SDI resource consumption and quota allocations. Generate user reports containing system and user interactions.

Network Services & Discovery

Network discovery integrates with system services to transparently handle scaling, failovers, and load balancing while providing real-time uninterrupted access to all SDIs. SDIs run across multiple nodes in a cluster with network traffic that is automatically delivered to the appropriate destination.

Memory Usage Optimizations

SDI OS overcommits memory at a SDI, user, and tenancy level enabling extreme hardware performance. SDI OS understands each logical SDI environment and leverages that information to intelligently place resources across the cluster, merge like memory, and map reduce for optimal environment execution.

Coordinated Protection

Integrated Network Security

Integrated networking with switching, routing, and security services. Deploy SDIs containing managed software-defined networks and routers that combine gateway services such as IPv4, IPv6, NAT, DHCP, Port Forwarding, and more. Seamlessly integrate them with physical infrastructure for hardware-in-the-loop.


SDI Checkpoints & Snapshots

At any point in time a SDI can save its entire state as a a checkpoint. Checkpoints can be used to restore a cyber environment to a particular point in time when a failure or system error occurs. Create multiple SDI checkpoints to provide point in time restores.


Exercise Individuals & Teams

Build and test end-to-end prevention processes and workflows while exercising teams during full-on operationally real cyber attack life cycles. Practice identifying and preventing live threats using different cyber environment scenarios.

Deception

SDI Definition Encryption

Each SDI Definition is encrypted and securely stored obfuscating any details from an adversary. Cyber environment assets can also be configured to encrypt their data providing additional data protection.

Honeypot / Honeynet

Deploy real operational honeypot and honeynet cyber environments to gather intel on any adversaries both external and internal so you can counter attempts at unauthorized use of your cyber systems.

Decoys

Integrate decoys into your cyber environments or existing resources to stop any adversaries who may already be inside your networks. Decoys can alert you to any unauthorized access.

Randomize IP & MAC

Continuously deploy cyber environments that cannot be easily network mapped by randomly changing IP and MAC address assignment. Make it difficult to target your cyber environment assets.

Dynamic Positioning

Build cyber environments once and then run them everywhere with reliability.

What is a SDI?

A SDI is an entire cyber environment packaged up as a single self-contained executable file. All cyber environment resources are contained in a SDI including its applications, OSs, VMs, containers, ISV products, software switches and routers, and configuration specifics.

Agility

SDI as a File enables cyber environments to be instantly deployed, modified, copied, cloned, shared, ported, backed up, and secured. Standardize your cyber environments with a push of a button eliminating configuration times, failures, and discrepancies.

Mobility

Easily deploy your cyber environments on multiple clouds, data centers, labs, and edge computing venues. SDIs can be versioned, stored in a repository or backed up at an alternative location. SDIs enable immutability, eliminating discrepancies and failures.

Dynamic Representation

SDI OS provides an intuitive centralized management interface that simplifies all operations and capabilities. Run any SDI with a single click. Provide control, monitoring, and administration from a single pane of glass for all tasks. The Web UI delivers visibility into SDIs and includes a WYSIWYG editor for building and modifying SDIs. Once a user is authenticated they have access to their dashboard and all the features and functionalities granted to them by the admin.

Drag & Drop

Simply drag and drop cyber environment resources together to quickly create your desired SDI. Drag switches, routers, workstations, servers, databases, apps and more to quickly build cyber environments. SDI OS will automatically network the environment components together as you build an SDI. Quickly generate new environment topologies to meet cyber resiliency requirements.


Remote Machine Access & VDI

Remotely access SDI machine consoles and desktops through the Web UI. Seamlessly support virtual desktops with on-demand access. Directly interact with apps and services. Along with console access, machine services such as web servers, remote desktop, SSH, and many others can be port forwarded and accessed directly. Virtual desktops and consoles are built into Cypherpath SDIs and are ready out-of-the-box.

RESTful Programmatic Interface

Programmatic control provides full automation and integration of the system for management. Control every aspect of cyber environment management, including creation, delivery, execution, and performance enabling extensive automation. Develop new applications on top of SDI OS to meet new business requirements. Automate workflows and establish new policies. Seamlessly integrate Cypherpath with other tools.

Persistence

01

Versioning

Each SDI can be exported as a single versioned file. Users can then run standardized cyber environments with a single click, eliminating configure times, failures, and discrepancies. IT can then deploy services and applications faster. Backup the entire cyber environment and not just the data.


02

Persistence

Each SDI and its resources can automatically be reset to their starting states enabling faster cyber environments and limiting exposure time to corruption, modification, or compromise. SDIs can also persist their environments and data while executing, providing a reliable platform for services and fast data applications.


03

Checkpointing

At any point in time a SDI can save its entire state as a a checkpoint. Checkpoints can be used to restore a cyber environment to a particular point in time when a failure or system error occurs. Create multiple SDI checkpoints to provide point in time restores.


04

Immutability

SDIs can be used to provide immutable cyber environments. Simply create the next "gold version" of your SDI and replace the current one with the new one. Eliminate configuration drifts and vulnerability to attack. Increase uptime by deploying SDIs instead of restoring cyber environments from unique configurations and versions.

Redundancy

Eliminate environment downtime and support strong SLAs. Keep your cyber environments up and operational with minimal effort using SDI OS's advanced resiliency, operational, and troubleshooting features engineered around a modern N+1 highly available architecture.

Automatic Recovery

During a network node or workload failure SDI OS automatically detects the failure and recovers from it with no configuration requirements.

Automatic Failover

During a hardware failure, control is automatically passed to another node in the cluster maintaining seamless workload operations.

Self-Service

Deploy SDIs anytime with on-demand self-service provisioning enabling continuous cyber resiliency and devops strategies such as blue/green, canary and a/b.

Live Backups

Easily and rapidly recover from a disaster or storage failure with live backups of your running deployment while maintaining operations.

Segmentation

Namespace Isolation

SDIs are executed across the cluster isolated from each other all the way down to the kernel level. This ensures that resources and configurations in one SDI cannot affect another while underlying hardware resources are consumed concurrently.

Sandboxes

Deploy safe isolated sandboxed cyber environments at any scale. Research and respond to existing and emerging real-world threats in isolated safe cyber environments. Test the effectiveness of your teams, tools, tactics, and procedures.

Logging

Monitor and view deployment operations via simplified logging across the cluster. Troubleshoot and collect metrics with ease to meet policy or compliance requirements. Remotely access logs and SDI metrics for deeper analysis of usage and performance.