CipherStash ProxyRead the getting started guide 

The Postgres proxy to scale and secure your database

CipherStash Proxy enables you to audit every query and corresponding data access, protect data with searchable encryption, and enforce fine-grained access controls.

Introducing CipherStash Proxy.

CipherStash Proxy is a data protection gateway built for Postgres.

Technology Preview
Diagram comparing an application's database connection without and with CipherStash Proxy. On the left, data is shown as plain text and mentions potential data leaks. On the right, with CipherStash Proxy, data is encrypted and secured, indicating protection from untrusted or compromised clients.

Without CipherStash Proxy

Traditionally, databases expose data in plain text, risking leaks due to compromised credentials.

ETL and replication processes must be given full access to the database, further risking data.

Diagram comparing an application's database connection without and with CipherStash Proxy. On the left, data is shown as plain text and mentions potential data leaks. On the right, with CipherStash Proxy, data is encrypted and secured, indicating protection from untrusted or compromised clients.

With CipherStash Proxy

With CipherStash Proxy, an encryption layer protects data. Even with compromised credentials, CipherStash Proxy secures data, enhancing system security.

Encryption-in-Use and fine-grained identity and access control deepen your data's defences, significantly reducing the chances of a breach.

Works in tandem with your existing stack.

Your infrastructure

CipherStash Proxy runs privately in your own cloud or on-premise environment. Your data never leaves your systems.

No code required

No changes required to existing apps, integrations, or data analysis workflows. It's truly plug-and-play.

Precision access control

Sensitive access must be via CipherStash Proxy, enabling fine-grained identity and access control policies down to the database row level.

Automatic secrets rotation

CipherStash Proxy automatically rotates database credentials on a regular basis, reducing the risk of credential theft.

Pipelined and multithreaded

Written in Rust, CipherStash Proxy is fast and efficient, and can handle thousands of concurrent connections.

Data integrity protection

CipherStash Proxy has built in data integrity protection using cryptographic tags which verify that data has not been modified.

Ready to protect your data?

Get started for free with CipherStash Proxy or read the whitepaper to learn more.