Reinforcing trust by auditable and verifiable systems
Often your users and your partners require efforts beyond regular "just make it secure". They demand transparency and secure audit logging that provides sufficient confidence in your system. PCI DSS audit trails are one side of the coin; settlement logs and system transparency for marketplaces and intermediaries is another.
Modern cryptography offers a whole set of protocols and approaches to back your claims and provide ways to prove your system's behaviour.
Transparent, auditable systems are hard
Audit logging is hard to blend
Trusted multi-party logs are crucial
Provable logs are hard
Modern crypto enables transparency
Coverage and transparency design
Security and compliance
Tools and services we offer
To be announced
There's a product that we're preparing to address provable audit logging – Please stay tuned for further announcements.Read more
Acra offers a selective and searchable encryption which is easy-to-integrate in already-built infrastructures. It provides verifiable audit logging for all sensitive data operations: access, encryption-decryption, removal, key management, etc.Read more
Verifiable audit logging modules
We design & build verifiable audit logging components that you can integrate into your software architecture. Different approaches are beneficial depending on your use case – a hash-connected chain of logs, Merkle-trees-based logs, etc.
Have a question? Get a human to answer it!
How we make a difference
Fit to real-world risks
Cryptographers and data security experts
For innovators, by innovators
We've started Cossack Labs to develop new tools and methods for protecting the data and enabling novel solutions to emerging problems — so that at the edge of your innovation, you’ve already got fitting tools handy.
There are many ways we can help: with our products, bespoke solutions, and engineering services. Leave your contact information to connect with our team:
Relevant stories and posts
Protecting telemetry data of power grids
Protecting data signals transmitted over the air between power distribution stations and central dispatch system.
Security logs: cryptographically signed audit logging for data protection
Why crypto signed audit logs are essential for security software and how we’ve built-in secure audit logging in Acra for defense in-depth.
Cloud security: gaps in a "shared responsibility" model
Security responsibility of cloud providers: where it ends, what are the gaps, and what steps your team should make to improve cloud security strategy.