Increase the security, reliability and performance of your database.

A database proxy built for SQL databases that is easy to deploy and will improve your data security posture in under an hour.

run-proxy.sh
cipherstash-proxy.toml
#!/bin/bash
# Run the CipherStash proxy
docker run \
-p 6432:6432 \
-v /path/to/cipherstash-proxy.toml:/etc/cipherstash-proxy/cipherstash-proxy.toml \
cipherstash/cipherstash-proxy:latest

Introduction

CipherStash Documentation

With CipherStash you can massively improve data security in under an hour. Built for SQL databases, CipherStash Proxy sits between your application and your database, auditing and encrypting data in-use.

Overview

Follow the links below to find out more about our products and how to start protecting your data with CipherStash.

Easy to deploy

Step-by-step guide to deploying the free version of CipherStash Proxy.

Audit

Enable audit logs to ship data to CipherStash for analysis.

Encrypt

Start encrypting your data with CipherStash.

Key management

Learn about ZeroKMS, our Zero Trust key management product.

Getting help

Having trouble? We want to help you.