Hermes
Zero trust, end-to-end encrypted, secure data storage and sharing framework
Enforce access control and facilitate sharing with end-to-end encryption via client-side SDK. Hermes provides cryptographically protected data processing and data collaborating without the need to re-encrypt an excessive amount of data.
A simple way of collaborating on end-to-end encrypted data
Industries
Hermes’ unique capabilities are the best to protect shared structured documents, where different fields have different security risks and access control patterns.
Finance
Store and process customer payment data and PII securely, minimise insider threats and enable secure, accountable cross-organisation data exchange.
Healthcare
Share FHIR and other medical records safely and distribute granular access to all entities in your system. Spend less on access control while gaining more fine-grained security.
Enterprise
Protect commercially sensitive data and enforce access control, integrate with existing PKI and IAM, enforce group policies and efficient key/storage management – all the while keeping the data end-to-end encrypted.
Advanced use-cases
Get started with Hermes
See Hermes documentation for more info and how-tos
Related materials

RepoMetaScore: evaluating supply chain risks of open-source repositories
Releasing RepoMetaScore: a dependency checking tool that analyzes metadata of open-source project, including commit history and contributors’ background. RepoMetaScore calculates risk rating, makes supply chain risks visible and prevents weaponizing OSS.

Cossack Labs stands on guard for security of Ukrainian companies
Cossack Labs stands with Ukraine and offers free security assessment and engineering services for Ukrainian companies to improve country protection and resilience.

Security of React Native libraries: the bad, the worse and the ugly
How to select a secure React Native library for your app. Sort out improper platform usage, easy to misuse API, deprecated and abandoned libraries – check our research of the React Native ecosystem security.