Matomo

Database encryption solutions

🇺🇦 We stand with Ukraine, and we stand for Ukraine. We offer free assessment and mitigation services to improve Ukrainian companies security resilience.

Typical database encryption requirements

Modern database encryption solutions

Database encryption methods #

Different database encryption methods provide various security guarantees. Acra field level encryption works transparently for the app and the database, requires zero application code changes and hides cryptographic details from developers.

Database at-rest encryption

Encryption of

The whole database

Access to encryption keys

The database

Plaintext leakage from DBAs

Yes

Plaintext leakage from backups

Yes

Number of keys

One for the whole database

Application code changes

None

Microsoft / Oracle TDE

Encryption of

The whole database

Access to encryption keys

The database

Plaintext leakage from DBAs

Yes

Plaintext leakage from backups

Yes

Number of keys

One for the whole database

Application code changes

None

Client-side field level encryption

Encryption of

Selected sensitive fields

Access to encryption keys

Client app

Plaintext leakage from DBAs

No
data is encrypted before it gets to the database

Plaintext leakage from backups

No
data is encrypted before it gets to the backup

Number of keys

Per field, per app

Application code changes

Significant

Encryption of

Selected sensitive fields

Access to encryption keys

Acra

Plaintext leakage from DBAs

No
data is encrypted before it gets to the database

Plaintext leakage from backups

No
data is encrypted before it gets to the backup

Number of keys

Per field, per app, per zone

Application code changes

None, or very small

Our mission is simple.

Our offerings

// Database encryption software

Acra

A DATABASE SECURITY SUITE
Acra offers a field level and searchable database encryption which is easy-to-integrate in already-built infrastructures. Acra works with SQL and NoSQL databases. Acra gives transparent field level encryption proxy and encryption-as-an-API service.

To be announced

There’s something we’re preparing to address new challenges – Please stay tuned for further announcements.

// Consulting

Security engineering & architecture

Our security engineers team will assist with integrating field level encryption for sensitive data in your infrastructure (re-design the dataflow, optimise SQL queries, ensure HA and load balancing, migrate data, etc.) to mitigate the risks of data leakage.

Multi-layered defenses

Encryption never comes alone. We will advise you on data migration, key management, designing application level encryption flow, implementing certain security features, assessing your product, verifying its security properties, and providing actionable advisory on improvements.

SSDLC

We help teams set up and improve the SSDLC for application development. We assist in prioritising and implementing security features, suggest automated tools and follow the latest security guidelines and regulations.

Have a question? Get a human to answer it!

How we make a difference

Database encryption in use

Additional relevant materials

Frequently Asked Questions

For innovators, by innovators

Contact us

Get whitepaper

Apply for the position

Our team will review your resume and provide feedback
within 5 business days

Thank you!
We’ve received your request and will respond soon.
Your resume has been sent!
Our team will review your resume and provide feedback
within 5 business days