Modern data security solutions
The default state of sensitive data should always be "encrypted unless it is part of an active computation" (Ten Commandments of Software by the US Department of Defense). In 2022, enabling the “data at rest encryption” checkbox and using TLS are not enough to call it “a data security system”.
Modern data security layer allows to keep data encrypted but searchable, anonymized for BI teams, and available for authorized users. We have been building various data security solutions since 2014 to keep data highly usable, software products fast and efficient, and business flows uninterrupted.
Typical challenges with data security
Developers are not crypto engineers
Key management is hard
Compliance is vague
Attackers are not a myth
// Data security software
A DATABASE SECURITY SUITE
A CROSS PLATFORM CRYPTO LIBRARY
END-TO-END SECURE DATA STORAGE
To be announced
// Custom design and implementation
Custom data security engines
Auditing and reviewing
Product security strategy
Have a question? Get a human to answer it!
How we make a difference
Extensive experience and expertise
Security for unique cases
Transparent to you, transparent to users
Built to last
For innovators, by innovators
We've started Cossack Labs to develop new tools and methods for protecting the data and enabling novel solutions to emerging problems — so that at the edge of your innovation, you’ve already got fitting tools handy.
There are many ways we can help: with our products, bespoke solutions, and engineering services. Leave your contact information to connect with our team:
Defense in depth security strategy based on data encryption
Defence in depth approach to building secure apps explained with the help of Acra encryption suite.
Acra 0.90.0: application level encryption and searchable encryption for any SQL and NoSQL databases
Acra Community Edition 0.90.0 – database security suite for SQL and NoSQL databases, which comes with application level encryption, searchable encryption, and encryption-as-a-service API available for any developer.
Audit logs security: cryptographically signed tamper-proof logs
Why crypto signed audit logs are essential for security software and how we’ve built-in secure audit logging in Acra for defense in-depth.