Getting started
Resources
Pricing
Docs
Blog
Login
Create an account
Toggle Menu
Frequently Asked Questions
All
Audit
CipherStash Proxy
Encrypt
Integrations
Performance
Pricing
Product comparison
Searchable encryption
Security and risk
Set up and usage
Use case
ZeroKMS
Can I send the output of Audit to my SIEM?
What does Audit do?
How much data does Audit generate?
Is CipherStash Proxy open-source?
How are the other components (apart from CipherStash Proxy) deployed?
How does CipherStash Proxy make my data more secure?
How much of SQL does CipherStash Proxy support?
Does CipherStash use Fully Homomorphic Encryption (FHE)?
How does CipherStash prevent data breaches?
Can I define policies on how and when data is decrypted?
Does CipherStash Proxy currently protect unstructured data?
Does your product do anomaly detection?
Does CipherStash Proxy work with any instance of Postgres?
How does Encrypt make my data more secure?
Does CipherStash work with my database?
What identity providers do you support?
Can I deploy CipherStash Proxy to AWS/GCP/Azure?
Does CipherStash only support PostgreSQL?
What is the performance overhead?
How much does CipherStash Proxy cost?
How is Encrypt different to Microsoft Always Encrypted or Oracle TDE?
What about secure enclaves in SQL Server – don't they allow search?
We have fine-grained control in AWS – doesn't that already protect me?
Why use ZeroKMS instead of just KMS?
What encryption technologies do you use?
How is searchable encryption different to encryption-at-rest?
Do you have security certification?
Is your encryption quantum safe?
Can I use my own keys?
Can we self-host?
How is CipherStash Proxy deployed?
What are the top use-cases for CipherStash Proxy?
Who is your typical customer?
How do you do key management?
What is ZeroKMS?
Can I bring my own keys?
What happens if we lose a key?
Does ZeroKMS work with Hardware Security Modules (HSMs)?
Start protecting your Postgres data
Get started by installing the NPM package, or get in touch to learn more.
Try it yourself
Get in touch →