Modern data security solutions
The default state of sensitive data should always be "encrypted unless it is part of an active computation" (Ten Commandments of Software by the US Department of Defense). In 2022, enabling the “data at rest encryption” checkbox and using TLS are not enough to call it “a data security system”.
Modern data security layer allows to keep data encrypted but searchable, anonymized for BI teams, and available for authorized users. We have been building various data security solutions since 2014 to keep data highly usable, software products fast and efficient, and business flows uninterrupted.
Typical challenges with data security
Developers are not crypto engineers
Key management is hard
Compliance is vague
Attackers are not a myth
Modern data security solutions
Novel methods to make crypto more usable
Anonymisation and tokenisation
Application level encryption
Tools and services we offer
As a high-level cross-platform cryptographic library for mobile, web, and server platforms, Themis helps to integrate application level encryption fast and easy. It solves 90% of typical data protection use cases that are common for most apps.Read more
Acra makes field level encryption and searchable encryption easily integrated into existing infrastructures. Acra allows encrypting database fields “on the fly” without changing code, while Acra’s Data firewall and Anomalies Detection protect against suspicious activity.Read more
A security framework for end-to-end encrypted data flow. Hermes provides cryptographically protected data processing and data collaborating without the need to re-encrypt an excessive amount of data.Read more
Custom data security engines
Data security is not just encryption: masking, tokenisation, anonymisation, compartmentalisation and segmentation – we suggest the most suitable security engineering techniques aimed at protecting different types of data.Read more
Apart from searchable encryption in Acra, we’ve dealt with various searchable encryption schemes from blind indices and bloom filters to homomorphic encryption.Read more
Cryptography doesn't work alone. Typically, implementing data security requires integration with other security controls: cross-services authentication, API hardening, PKI, access control, audit logging, effective backups.Read more
Security layers for complex use cases
We build data security layers for complicated use cases: encrypted CRDT-based data collaboration, multi-device & multi-user synchronisation, DRM-like protections for TensorFlow ML models, UX-friendly security for apps that work on millions of devices.Read more
We help teams set up and improve the SSDLC for application development. We assist in prioritising and implementing security features, suggest automated tools and follow the latest security guidelines and regulations.Read more
Auditing and reviewing
We do security audits and review designs of existing implementations to give you a picture of how your application protects sensitive data, APIs, performs authentication, attest devices, etc.Read more
Have a question? Get a human to answer it!
How we make a difference
Extensive experience and expertise
Transparent to you, transparent to users
Built to last
For innovators, by innovators
We've started Cossack Labs to develop new tools and methods for protecting the data and enabling novel solutions to emerging problems — so that at the edge of your innovation, you’ve already got fitting tools handy.
There are many ways we can help: with our products, bespoke solutions, and engineering services. Leave your contact information to connect with our team:
Relevant stories and posts
Building ironclad data security for VDR SaaS
Building state-of-the-art security for Virtual Data Room — online document storage and collaboration platform. Integrating mobile-specific security measures seamlessly into mobile apps and aligning security with backend infrastructure.
Protecting telemetry data of power grids
Protecting data signals transmitted over the air between power distribution stations and central dispatch system.
Shared responsibility model in cloud security: mind the gap
Security responsibility of cloud providers: where it ends, what are the gaps, and what steps your team should make to improve cloud security strategy.