CipherStash ProxyRead the getting started guide 

A security product
that helps close deals

CipherStash is a security product that protects your customer's data using encryption. Whether you need to check a box in a security questionnaire, or want to improve your data security posture, we've got you covered.

The right balance of security and operational simplicity.

Deploy CipherStash Proxy between your application and database, and we'll handle the crypto.

Works wherever you run Postgres

Easy to deploy
CipherStash Proxy is a drop-in replacement for your existing PostgreSQL connection.
Encryption that protects data
The data stays encrypted even when in use. Choose what tables and columns to encrypt without affecting functionality or performance.
Performance and reliability
CipherStash Proxy is built on top of pgcat, which is used by Instacart to serve hundreds of thousands of queries per second.
Audit data-access events
Log every statement and ID of every record queried. Quickly identify over-access and eliminate issues before they take hold.

Security and visibility. À la carte.

CipherStash is a suite of tools that can be used together or independently to secure and audit your data.

Databases expose data in plain text even when using encryption at-rest, risking leaks due to compromised credentials or untrusted clients. Your data is encrypted and searchable, even when in use.

>_ psql

$ SELECT * FROM users ORDER BY email ASC; 

 id |       name       |          email          
----+------------------+------------------------- 
  1 | Darth Vader      | 8c1e8ad7e04228...       
  2 | Luke Skywalker   | e5a3d6a5c46888...      

Encryption in use that isn't painfully slow.

Our approach to searchable encryption scales with modern application use cases.

Data key management

We built ZeroKMS, our key management solution, that supports bulk operations to provide a unique data key for every record.

Fast and secure

We've spent years of R&D to make searchable encryption support a large set of queries and data types.

It's not homomorphic encryption

Homomorphic encryption is slow and not practical for most applications. CipherStash is built for real-world use cases.

Want to know about the tech?
We've published a whitepaper.

Watch the demo

Head of Solutions, CJ Brewer demonstrates CipherStash Proxy in action.

Frequently Asked Questions

What people are saying

Our approach to data security is resonating with developers and security professionals alike.

"If you store PII and tell me it's safe cause you encrypt data at rest, and in transit, you're wrong. If your app or DB is compromised your reputation is in the 🗑. @cipherstash - an end-to-end secure, searchable, performant database. Their infra, your keys. Get on it."

Matt Allen
CEO at Tractor Ventures

"Had a great chat this arvo with @danieldraper about @cipherstash. If I was founding something new today I'd be super duper likely to use this to replace my 'user.[rb|ts]' I love how it gives you a PII vault but with flexibility around querying."

John Barton
CTO at Amber Electric

Ready to protect your data?

Get started for free with CipherStash Proxy or read the whitepaper to learn more.