Trusted data access

CipherStash makes sure sensitive data is accessible only to the right people at the right time. Implement robust data security without sacrificing performance or usability.

Why CipherStash

What can you do with trusted data access?

Encryption in use

Store and use customer data with confidence

Your data stays encrypted even when it is in use. Open up new possibilities for customer value by keeping data secure but still searchable and usable.

Identity based

Control access to your data

Whether users are internal or external, your sensitive data stays protected. Grant access by scoping permissions down to individual pieces of data - provable with cryptography.

Audit trail

Demonstrate compliance

Be confident about your data security and privacy. Prove that you're protecting data - the control becomes the evidence you need.

Performance

Encryption that works at scale

ZeroKMS features bulk encryption and decryption operations that are both fast and scalable. It is designed for database workloads.

Encryption in use enables trusted data access.

Encryption in use keeps data encrypted even while it's queried in the database.

Works in any environment

Our encryption is based on industry standard primitives like AES and SHA2 and rigorously tested.

Standard encryption, but searchable
Encryption in use keeps data encrypted while keeping it searchable and usable, built on industry standard primitives like AES and SHA2.
Unique key per value
Encrypt each value individually, which is more secure compared to other encryption solutions that use a limited set of keys for all values.
Encryption is access control
When your data moves, the data remains encrypted and therefore unreadable without the appropriate keys. Use of the keys appears in your CipherStash logs, giving you insight into how your data is accessed.
Meet compliance; enable engineers
Raise the security bar, help meet compliance objectives, and empower your developers to work safely with sensitive data.

Secure data in PostgreSQL and DynamoDB.

Choose the right integration for your use case.

Postgres and Node.js
Trusted data access for Node.js applications and Postgres.
CipherStash for DynamoDB
Trusted data access for DynamoDB with CipherStash Rust crate.

All our integrations are source-available.

So what makes CipherStash encryption different?

Our searchable encryption scales with your data.

Unique key per value

We built our own key management solution, ZeroKMS, which supports bulk operations to provide a unique data key for every record.

Resilient and secure

With over 3 years of R&D, we've solved a lot of problems because cryptography is hard. We've made it easy to use encryption in your applications.

Not homomorphic encryption

Homomorphic encryption is slow and not practical for most applications. CipherStash is built for the real world use cases you have today.

Want to dive deeper?
We've published a whitepaper.

Start protecting your Postgres data

Get started by installing the NPM package, or get in touch to learn more.