Trusted data access
CipherStash makes sure sensitive data is accessible only to the right people at the right time. Implement robust data security without sacrificing performance or usability.
Why CipherStash
What can you do with trusted data access?
Encryption in use
Store and use customer data with confidence
Your data stays encrypted even when it is in use. Open up new possibilities for customer value by keeping data secure but still searchable and usable.
![](/images/encryption-in-use.png)
Identity based
Control access to your data
Whether users are internal or external, your sensitive data stays protected. Grant access by scoping permissions down to individual pieces of data - provable with cryptography.
![](/images/idps.png)
Audit trail
Demonstrate compliance
Be confident about your data security and privacy. Prove that you're protecting data - the control becomes the evidence you need.
![](/images/compliance.png)
Performance
Encryption that works at scale
ZeroKMS features bulk encryption and decryption operations that are both fast and scalable. It is designed for database workloads.
![](/images/perf.png)
Encryption in use enables trusted data access.
Encryption in use keeps data encrypted even while it's queried in the database.
Works in any environment
Our encryption is based on industry standard primitives like AES and SHA2 and rigorously tested.
- Standard encryption, but searchable
- Encryption in use keeps data encrypted while keeping it searchable and usable, built on industry standard primitives like AES and SHA2.
- Unique key per value
- Encrypt each value individually, which is more secure compared to other encryption solutions that use a limited set of keys for all values.
- Encryption is access control
- When your data moves, the data remains encrypted and therefore unreadable without the appropriate keys. Use of the keys appears in your CipherStash logs, giving you insight into how your data is accessed.
- Meet compliance; enable engineers
- Raise the security bar, help meet compliance objectives, and empower your developers to work safely with sensitive data.
So what makes CipherStash encryption different?
Our searchable encryption scales with your data.
Unique key per value
We built our own key management solution, ZeroKMS, which supports bulk operations to provide a unique data key for every record.
Resilient and secure
With over 3 years of R&D, we've solved a lot of problems because cryptography is hard. We've made it easy to use encryption in your applications.
Not homomorphic encryption
Homomorphic encryption is slow and not practical for most applications. CipherStash is built for the real world use cases you have today.
Want to dive deeper?
We've published a whitepaper.
Start protecting your Postgres data
Get started by installing the NPM package, or get in touch to learn more.