Secure your application data at rest and in motion Transport, authentication, data at rest protection. Get going fast, easily, across many platforms.
Easily protect sensitive data in your web app Encrypt in-app, store in existing backend, transparent access. Compartment trust via key isolation.
Manage granular data access cryptographically Assign CRUD rights per record to keys. Group records in larger entitives in flexible storage model.
Data lifecycle protection for sophisticated products Prevents data breaches, manages access and trust, easily integrates across all your infrastructure
We create data security tools for developers
Open Source CryptoCore crypto modules are available open source, all time, Apache 2 licensed
All-encompassing defenceFrom front-end through middleware to database and everywhere inbetween
Ready for enterpriseSpecial features, support, compatibility with corporate stack, automated configuration management, policies, audit trail
... and other features
Planning / Analysis#guidance
Design / Specification / Flow#guidance #products
Writing code#products #integration
Integration / Testing#products #integration
Here's how we can help
We can help to understand the risks, security goals and mitigation measures, analyze existing solutions and formulate demands to new ones.
Crypto guidance is most useful during planning, implementing and auditing/testing phases of your development.
We can help you choose, configure and deploy cryptography and data security tools in your infrastructure.
Choosing products should happen on specification / design stage of your development.
Sometimes, integrating tools into your solution might get tricky. We can help through support and custom engineering.
During integration, there are some situations where using our help might get you going much faster.
- 15 Aug 2016 In upcoming series of articles, we'll ascend from classic database security techniques to modern technologies, including some of the cutting edge research and our own experiments in the field.
- 27 Jul 2016 In this post, we talk about Zero-Knowledge Proofs, tie ZKP authentication to traditional security models and help you understand better how authentication, in general, should work.
- 20 Jul 2016 Lighter reading: general thoughts on how the familiar mindset of 'protect the perimeter' changed over time.
WHO WE AREWe've started Cossack Labs to build novel, convenient security tools and help clients across different industries to minimize losses from security incidents and breaches.
click here to learn more