A security product
that helps close deals
CipherStash is a security product that protects your customer's data using encryption. Whether you need to check a box in a security questionnaire, or want to improve your data security posture, we've got you covered.
The right balance of security and operational simplicity.
Deploy CipherStash Proxy between your application and database, and we'll handle the crypto.
Works wherever you run Postgres
- Easy to deploy
- CipherStash Proxy is a drop-in replacement for your existing PostgreSQL connection.
- Encryption that protects data
- The data stays encrypted even when in use. Choose what tables and columns to encrypt without affecting functionality or performance.
- Performance and reliability
- CipherStash Proxy is built on top of pgcat, which is used by Instacart to serve hundreds of thousands of queries per second.
- Audit data-access events
- Log every statement and ID of every record queried. Quickly identify over-access and eliminate issues before they take hold.
Security and visibility. À la carte.
CipherStash is a suite of tools that can be used together or independently to secure and audit your data.
Databases expose data in plain text even when using encryption at-rest, risking leaks due to compromised credentials or untrusted clients. Your data is encrypted and searchable, even when in use.
>_ psql
$ SELECT * FROM users ORDER BY email ASC; id | name | email ----+------------------+------------------------- 1 | Darth Vader | 8c1e8ad7e04228... 2 | Luke Skywalker | e5a3d6a5c46888...
Encryption in use that isn't painfully slow.
Our approach to searchable encryption scales with modern application use cases.
Data key management
We built ZeroKMS, our key management solution, that supports bulk operations to provide a unique data key for every record.
Fast and secure
We've spent years of R&D to make searchable encryption support a large set of queries and data types.
It's not homomorphic encryption
Homomorphic encryption is slow and not practical for most applications. CipherStash is built for real-world use cases.
Want to know about the tech?
We've published a whitepaper.
Watch the demo
Head of Solutions, CJ Brewer demonstrates CipherStash Proxy in action.
CipherStash in the press
What people are saying
Our approach to data security is resonating with developers and security professionals alike.
Ready to protect your data?
Get started for free with CipherStash Proxy or read the whitepaper to learn more.