Introduction
CipherStash Documentation
With CipherStash you can massively improve data security in under an hour. Built for SQL databases, CipherStash Proxy sits between your application and your database, auditing and encrypting data in-use.
Overview
Follow the links below to find out more about our products and how to start protecting your data with CipherStash.
Easy to deploy
Step-by-step guide to deploying the free version of CipherStash Proxy.
Audit
Enable audit logs to ship data to CipherStash for analysis.
Encrypt
Start encrypting your data with CipherStash.
Key management
Learn about ZeroKMS, our Zero Trust key management product.
Getting help
Having trouble? We want to help you.
- Looking for specific information? Try the FAQ.
- Can’t find what you’re looking for? Ask us a question.
- Want to chat? Book a technical demo.