With CipherStash you will be able to encrypt each individual record in your database with a unique data key. The ciphertext is searchable, allowing you to query your encrypted data without decrypting it or sacrificing performance. This is called encryption-in-use.
All decryptions are authorized and logged, giving you a cryptographically-proven audit trail of all access to sensitive data.
Most useful articles to get you familiar with our concepts and how to begin protecting your data.
Step-by-step guide to setting up your system and running the example app.
Learn how we achieve encryption-in-use with the Tandem product.
Learn about our Zero Trust key management product, ZeroKMS.
Install the CipherStash CLI to manage your workspaces.
Having trouble? We want to help you: