Crypteron
Try Free
Log In
  • Features
  • Pricing
  • Documentation
    • Developer Guide
    • Frequently Asked Questions
    • Support
  • Compliance
    • Compliance FAQ
    • PCI compliance (eCommerce)
    • HIPAA compliance (Healthcare)
    • Security Checklist
  • Blog
  • Contact
Log In Try For Free

CipherObject

For encrypting object – any cloud, any storage!

Building back-end applications and need to secure data across a variety of networks or data stores or big data platforms or machine learning platforms? Crypteron’s CipherObject is your ultimate data security solution. Featuring ultra-fast integrations, your organization can build secure, compliant applications without worrying about complex encryption details.

In minutes, CipherObject allows you to work with encrypted objects, allowing you to combine unprecedented security with unlimited flexibility. Encrypted objects can be stored, transported or processed regardless of the security capabilities of the underlying network, storage or compute resources.

 

Try it Free Today!
CipherObject
  • Features
  • How It Works
  • Azure Marketplace
  • Live Demo
  • Sign Up for Free!

Don’t Become The Next Data Breach Headline!

Adding military grade encryption and key management to your backend application shouldn’t be difficult. CipherObject makes it easy. After you add a [Secure] attribute (.NET) or @Secure annotation (Java) to class properties you want encrypted, call the Seal() function. This encrypts the object so it’s save to send over the network or persist to any database or a Big-Data cluster. When you want to process the encrypted object, you simply call the Unseal() function. CipherObject integrates with Crypteron’s security platform to take care of key management, multiple security partitions, auditing, access control rules and more, all from an intuitive dashboard. The encryption keys are themselves encrypted and stored separately from the application as well as database. Your data is always safe and always protected.

Prevent Data Breaches

Data stored in the cloud is inherently insecure. CipherObject solves this problem by encrypting your sensitive data at the source, before it ever leaves your application, reducing the circle of trust.

Regulatory Compliance

CipherObject allows you to build applications in the public cloud that comply with standards like HIPAA, PCI, FIPS-140-2, CJIS / Law Enforcement, FISMA, EU Data Protection and more, even when the underlying databases don’t support it.

Developer-Friendly

CipherObject was created by developers, for developers. We have SDKs for .NET and Java that take minutes to install and don’t require any significant changes to your application.

Self-Scaling Architecture

Our stateless security architecture scales with your application for near native performance at any scale. The overhead is marginal at about 1 ms per record containing multiple encrypted fields.

Works With Any Cloud Provider

CipherObject is fully compatible with any cloud provider. Whether it’s public cloud providers like Amazon Web Services, Microsoft Azure, Google Cloud Platform, Oracle, IBM etc. Crypteron can even work inside your private data center!

Works With ANY Databases

CipherObject enables encrypted objects, bringing data security at a very foundational level. Protect your data – any network, any storage medium!

How It Works

Code

.NET Example

Add the CipherObject’s SDK to your application using NuGet. Then it’s as simple as:

// Attributes on data class
public class Patient
{
    public int Id {get; set;}
    
    [Secure]
    public string FullName {get; set;}
    
    [Secure]
    public string SocialSecurityNumber {get; set;}
}

// myPatient is of type Patient
// Encrypt and sign the object before sending
myPatient.seal();

// Decrypt and verify the object after fetching
myPatient.unseal();

Java Example

Install the CipherObject SDK to your application using Maven. Then it’s as simple as

// Annotations on data class
public class Patient
{
    private int Id

    @Secure
    private String fullName;

    @Secure
    private String socialSecurityNumber;
}

// myPatient is of type Patient
// Secure the object before sending
CipherObject.seal(myPatient);

// Decrypt and verify the object after fetching
CipherObject.unseal(myPatient);

It’s that easy!

See It In Action (3 Minute Video)

CipherDB in the Cloud

CipherObject in the Cloud

Despite their excellent infrastructure, most cloud storage, big data analytics or machine learning technologies do NOT provide robust data-at-rest security. Traditional data stores keep data and encryption keys on the same server, right next to each other. Since you do not own or maintain the database servers, the cloud providers will always have administrative access to your data.

The bottom line is that data stored in the cloud is inherently insecure. In order to achieve true data security, you need to encrypt your sensitive data at the source before it ever leaves your server application.

Surveys and reports all point out that the #1 reason why companies cannot benefit from cloud computing is because of security and privacy concerns, especially when dealing with sensitive data such as medical records or financial information.

Don’t let your organization miss out on the cloud! With CipherObject you’re in control of your data, regardless of where it’s stored. The encryption keys are stored on a separate server and encrypted themselves with elliptic curve cryptography.

CipherObject works with any cloud provider including

CipherDB on Premises

CipherObject on Premises

For on-premise or hybrid applications, CipherObject provides multiple layers of encryption that are essential for defense-in-depth and secure-by-designs principals through application layer encryption.

Lower maintenance and higher reliability will attract more and more organizations towards a pure public cloud solution. In the meantime, CipherObject’s strong encryption and automatic key management helps out in almost every situation

Key Management and more with Crypteron

CipherObject integrates with Crypteron’s security platform which handles key management, multiple security partitions, access control rules, auditing, key rotations, key migrations and more. Crypteron encrypts your encryption keys and stores them separately from the application and your data, so your data is always secure.

Crypteron’s security platform includes an easy-to-use dashboard at my.crypteron.com.

View all of your Apps

Crypteron Dashboard - Apps

Each App can be optionally divided into multiple Security Partitions

Divide your App into Security Partitions

Each Security Partition has an Access Control List where you can specify roles and permissions

Specify an access control list

Compliance in the Cloud

Compliance in the Cloud

CipherObject makes it possible to deploy your application to the public cloud while also complying with your organization’s security policy or 3rd party standards such as HIPAA, PCI, FIPS-140-2, CJIS / Law Enforcement, FISMA, EU Data Protection and more.

HIPAA Compliance

CipherObject satisfies sections of the Security Standards and Safeguards under HIPAA. Security and privacy of patient medical records is impossible to achieve in the cloud paradigm without encryption. If you properly encrypt your data and a data breach takes place, you are not liable for negligence

PCI Compliance

Any company that touches credit card information, must secure that data in order to be PCI compliant. If the data is stored in a database, it must be encrypted within the storage medium and the encryption keys must be properly managed. Failure to do so cause the vendor to be stripped of its ability to accept credit cards and be subject to hefty fines.

CipherObject Makes Compliance Simple

In order to be compliant, most organizations either abandon the public cloud or build their own encryption infrastructure which takes a tremendous amount of time, resources, and technical expertise. CipherObject provides the best of both worlds, allowing you to take advantage of the cloud while taking care of the entire process of encryption, key management and key migrations. Your team can now focus on your core business and not waste time and resources solving a problem already solved and solved well.

Learn more about compliance with CipherObject

Under the Hood

Under the Hood

Briefly stated, CipherObject uses FIPS-140-2 certified elliptic curve cryptography and AES 256 bit in the latest GCM mode to protect your data. The encryption is so robust that even the National Security Agency (NSA) recommends it for the protection of government and military classified information. In fact AES256-GCM is even permitted to encrypt sensitive data classified as “TOP-SECRET” – the highest classification level possible. CipherObject’s use of 521-bit elliptic curve cryptography is stronger than 15,000-bit RSA.  With CipherObject you get that level of encryption with marginal overhead – just about 1 ms per record containing multiple encrypted fields. Plus database operations usually travel over a network, which means the real world performance is almost the same as using no encryption at all. The technical specification document can be found here. More details can be found in our developers guide.

  • Code
  • CipherObject in the Cloud
  • CipherObject on Premises
  • Key Management
  • Compliance in the Cloud
  • Under the Hood

Microsoft Azure Marketplace

In addition to being able to sign up here Crypteron has partnered with Microsoft to make it available through the Microsoft Azure Marketplace. Signing up has never been easier for Microsoft Azure customers. All billing is handled through your existing Azure subscription so no credit card is required!

Find Crypteron in the Microsoft Azure Marketplace today!

True, next-gen cloud databaseCurrent cloud deployments
Product Microsoft Azure SQL Amazon RDS SQL Server Amazon RDS MySQL SQL Server MySQL
Type Database-as-a-service Infrastructure-as-a-service
(VMs in the cloud)
Industry trend
Data-at-rest encryption No encryption possible, application layer encryption like CipherDB required for any security Application responsible for key management and orchestrating T-SQL scripts to encrypt/decrypt on each access. Data and keys both reside together. "Security" through insecure AES-ECB cryptography (keysize doesn't matter) Application responsible for key management and orchestrating T-SQL scripts to encrypt/decrypt on each access. Data and keys both reside together. "Security" through insecure AES-ECB cryptography (keysize doesn't matter)
Why CipherDB? Enables Strong data encryption to protect your data-at-rest. Application shielded from security complexities. Key management handled by CipherDB. Data and keys reside separately. Application shielded from security complexities. Key management handled by CipherDB. Data and keys reside separately so a database server breach still keeps your data safe. More secure and advanced AES-GCM modes at 256bit key sizes. Even the National Security Agency (NSA) approves AES256-GCM for protecting top-secret government secrets. Application shielded from security complexities. Key management handled by CipherDB. Data and keys reside separately. More secure and advanced AES-GCM modes at 256bit key sizes.
Infrastructure management Fully automated. Full independence from underlying (virtual) hardware.
Database administration costs drastically reduced
Mostly automated. Partial dependence on the specifications of the underlying (virtual) hardware.
Database administration costs reduced.
Fully responsible for the management, patching and upkeep of your virtual servers. Database administration is still a complex task requiring a dedicated operations team.
Scale and reliability Excellent Good Moderate scalability. Reliability a challenge as you are responsible for server maintenance.

Recent blog posts

Encryption

Migrating existing live data into Crypteron

You’re already live in production. And you have sensitive in the clear. Read this article to see how Crypteron can help.

code

Encryption, Entity Framework and Projections

Projections in Entity Framework live outside the entity lifecycle. Read more to learn how your can use Crypteron to secure such data.

KeyManagement

PCI DSS and key rotations simplified

PCI compliance requires data encryption keys to be changed frequently. Here is how you can do it easily.

google-cloud-exploitation-featuredimage

Your data-center is not secure and what you can do about it

There is no secure perimeter anymore. Neither in your corporate network nor in your data center. Fight a winning battle armed with self-protecting data rather than a losing one trying to protecting the infrastructure.

startup-whiteboard

Introducing the Crypteron Startup Innovators Program

Qualifying startups get up to 50% off all plans. Tell us how you’re changing the world and the our Startup Innovators Program will support your journey.

banner

6 encryption mistakes that lead to data breaches

If encryption is so unbreakable, why do businesses and governments keep getting hacked? Six common encryption mistakes that lead to data breaches.

community

Announcing the new Crypteron Community Edition

Starting today you can now sign up for the Crypteron Community Edition for free with no performance limitations.

mouse

Data breach response – One click to save your business

Get breathing room – when you need it the most. Respond to a data breach with a single click.

crowd

Why We Need Proper Data-At-Rest Encryption: 191M U.S. Voters’ Data Exposed

Adding security at the application level is a large step forward in protecting data from the constant threat of data breaches

code

How to encrypt large files

CipherStor is blazingly fast! Here we show how to use it within your data-flow pipeline to maintain high performance when encrypting large files.

Company

  • Executive Team
  • Contact us

Legal

  • Terms of Service
  • Privacy Policy

Social

  • Twitter
  • Facebook
  • LinkedIn

© Crypteron™ 2013 and protected by one or more patents.
Crypteron, CipherDB, CipherStor, CipherObject, TotalAuth and DosCipher are all trademarks of Crypteron Inc. All rights reserved.

Try Crypteron for Free!

Registration is almost complete! We sent an email to:

Please check your email to activate your account. If you do not receive an email, please contact support.