Crypteron
Try Free
Log In
  • Features
  • Pricing
  • Documentation
    • Developer Guide
    • Frequently Asked Questions
    • Support
  • Compliance
    • Compliance FAQ
    • PCI compliance (eCommerce)
    • HIPAA compliance (Healthcare)
    • Security Checklist
  • Blog
  • Contact
Log In Try For Free

CipherStor

For Files and Streams

Building back-end applications and need to secure files, cloud storage or streams? Crypteron’s CipherStor is your ultimate data security solution. Featuring ultra-fast integrations, your organization can build secure, compliant applications without worrying about complex encryption details.

Try it Free Today!
CipherStor
  • Features
  • How It Works
  • Sign Up

CipherStor is a CipherDB add-on for .NET applications that create and store files in the cloud or on premises. It utilizes the same robust military grade encryption and in-built key management as CipherDB. CipherStor is an ideal self-scaling encryption security solution for unstructured databases or file systems.

Regulatory Compliant

CipherStor allows you to comply with standards like HIPAA, PCI, FIPS-140-2, CJIS / Law Enforcement, FISMA, EU Data Protection and more, even when the underlying databases don’t support it.

Secure Any File Type

  • Media (MP3, MPEG, AAC, etc.)
  • Images (JPEG, PDF, etc.)
  • Documents (DOC, PPT, XLS, etc.
  • ALL file types supported

Extends CipherDB

CipherStor uses the same security model as CipherDB. This allows you to use the same set of security partitions and access control rules across your structured and unstructured data all managed from one easy to use dashboard.

Secures Data-at-Rest

Although data-in-transit is usually encrypted via SSL, once that data reach its destination, it is often saved to the file system without any encryption. CipherStor encrypts your sensitive data at the source before it ever leaves your .NET application.

Secures Data-in-Transit

CipherStor adds an additional layer of security to SSL which has shown vulnerabilities. Even if your CipherStor encrypted data is sent over an insecure connection, anyone intercepting the data will be unable to decrypt it.

Works With Any Cloud Provider

CipherStor is fully compatible with all cloud providers such as Windows Azure, Amazon Web Services, Rackspace Cloud, Savvis, Terremark,  VMWare and more.

On-Premises Applications

Even if your application is hosted on-premises, CipherStor adds an additional layer of security, preventing against physical theft while maintaining a consistent security model with CipherDB.

Self-Scaling Architecture

Our stateless security architecture scales with your application for near native performance at any scale.

Easy Integration, Full control

Upgrades your server applications for true cloud-aware data security without makeshift gateway solutions and vendor lock-in.

How It Works

CipherStor Code Example

Encrypting a file with CipherStor is incredibly simple. Just add two lines of code to your .NET or Java application:

// Provide an optional security partition and user role
var cipherStor = new CipherStorExt(securityPartition, userRole);

// Provide the path to the file, the output path for the encrypted file,
// and a boolean of whether or not to compress the encrypted file
cipherStor.EncryptLocalFile(filePath, encryptedFilePath, compressFile);
CipherDB in the Cloud

CipherStor in the Cloud

Files transmitted to cloud storage may encrypted via SSL while in-transit. However, once they arrive at the cloud provider, they are often stored in the clear or encrypted with encryption keys residing right in the same service or same cloud provider. CipherStor ensures that your files are encrypted before they ever leave your application. Even if the files are sent over an insecure transport or stored in the clear, the privacy, integrity and confidentiality of the data is always preserved.

When your application reads an encrypted file from cloud storage, CipherStor decrypts the data only within your application. Best of all? The encryption keys are themselves encrypted and stored separately from your application and your cloud provider.

CipherStor’s key management is integrated with CipherDB allowing you to have one unified security model that covers your database and file system for your entire application.

CipherObject works with any cloud provider including

Key Management Integrated

Key Management in CipherStor is unified across all Crypteron agents, regardless of whether it’s CipherDB, CipherStor or CipherObject and regardless of whether it’s from the Java or C# agents. This allows you to use one security model for your entire application or application suite. Your database and file system will have one set of access control rules and security partitions managed from the Crypteron Dashboard. Learn more about Key Management with the Crypteron Dashboard.

Compliance in the Cloud

Compliance with CipherStor

By using CipherStor’s strong encryption and proper key management that’s 100% in your control, you can comply with your own organization’s security policy or third party standards like HIPAA or PCI (to name a few).

HIPAA Compliance

CipherStor satisfies sections of the Security Standards and Safeguards under HIPAA. Security and privacy of patient medical records is impossible to achieve in the cloud paradigm without encryption. A full discussion of how Crypteron can satisfy HIPAA requirements can be found here.

PCI Compliance

Any company that touches credit card information, must secure that data in order to be PCI compliant. If the data is store in an unstructured data store, it must be encrypted within the storage medium and the encryption keys must be properly managed. Failure to do so cause the vendor to be stripped of its ability to accept credit cards and be subject to hefty fines. A full discussion of how Crypteron can satisfy PCI requirements can be found here.

Learn more about compliance with CipherStor

Under the Hood

Under the Hood

CipherStor uses the same encryption as CipherDB to protect your files: FIPS-140-2 certified AES 256 bits in the latest GCM mode. The encryption is so robust that even the National Security Agency (NSA) recommends it for the protection of government and military classified information. In fact AES256-GCM is even permitted to encrypt sensitive data classified as “TOP-SECRET” – the highest classification level possible.

Read the technical specification for more details.

  • Code Example
  • CipherStor in the Cloud
  • Key Management
  • Compliance in the Cloud
  • Under the Hood

Microsoft Azure Marketplace

CipherStor is a premium add on for CipherDB that is currently offered at no additional charge. Microsoft Azure customers can choose to sign up for CipherDB through the Microsoft Azure Marketplace. All billing is handled through your existing Azure subscription so no credit card is required!

Find CipherDB in the Microsoft Azure Marketplace today!

True, next-gen cloud databaseCurrent cloud deployments
Product Microsoft Azure SQL Amazon RDS SQL Server Amazon RDS MySQL SQL Server MySQL
Type Database-as-a-service Infrastructure-as-a-service
(VMs in the cloud)
Industry trend
Data-at-rest encryption No encryption possible, application layer encryption like CipherDB required for any security Application responsible for key management and orchestrating T-SQL scripts to encrypt/decrypt on each access. Data and keys both reside together. "Security" through insecure AES-ECB cryptography (keysize doesn't matter) Application responsible for key management and orchestrating T-SQL scripts to encrypt/decrypt on each access. Data and keys both reside together. "Security" through insecure AES-ECB cryptography (keysize doesn't matter)
Why CipherDB? Enables Strong data encryption to protect your data-at-rest. Application shielded from security complexities. Key management handled by CipherDB. Data and keys reside separately. Application shielded from security complexities. Key management handled by CipherDB. Data and keys reside separately so a database server breach still keeps your data safe. More secure and advanced AES-GCM modes at 256bit key sizes. Even the National Security Agency (NSA) approves AES256-GCM for protecting top-secret government secrets. Application shielded from security complexities. Key management handled by CipherDB. Data and keys reside separately. More secure and advanced AES-GCM modes at 256bit key sizes.
Infrastructure management Fully automated. Full independence from underlying (virtual) hardware.
Database administration costs drastically reduced
Mostly automated. Partial dependence on the specifications of the underlying (virtual) hardware.
Database administration costs reduced.
Fully responsible for the management, patching and upkeep of your virtual servers. Database administration is still a complex task requiring a dedicated operations team.
Scale and reliability Excellent Good Moderate scalability. Reliability a challenge as you are responsible for server maintenance.

CipherStor is Coming Soon!

To be notified when CipherStor launches, enter your email below.
Note, CipherDB is available now!

Recent blog posts

Encryption

Migrating existing live data into Crypteron

You’re already live in production. And you have sensitive in the clear. Read this article to see how Crypteron can help.

code

Encryption, Entity Framework and Projections

Projections in Entity Framework live outside the entity lifecycle. Read more to learn how your can use Crypteron to secure such data.

KeyManagement

PCI DSS and key rotations simplified

PCI compliance requires data encryption keys to be changed frequently. Here is how you can do it easily.

google-cloud-exploitation-featuredimage

Your data-center is not secure and what you can do about it

There is no secure perimeter anymore. Neither in your corporate network nor in your data center. Fight a winning battle armed with self-protecting data rather than a losing one trying to protecting the infrastructure.

startup-whiteboard

Introducing the Crypteron Startup Innovators Program

Qualifying startups get up to 50% off all plans. Tell us how you’re changing the world and the our Startup Innovators Program will support your journey.

banner

6 encryption mistakes that lead to data breaches

If encryption is so unbreakable, why do businesses and governments keep getting hacked? Six common encryption mistakes that lead to data breaches.

community

Announcing the new Crypteron Community Edition

Starting today you can now sign up for the Crypteron Community Edition for free with no performance limitations.

mouse

Data breach response – One click to save your business

Get breathing room – when you need it the most. Respond to a data breach with a single click.

crowd

Why We Need Proper Data-At-Rest Encryption: 191M U.S. Voters’ Data Exposed

Adding security at the application level is a large step forward in protecting data from the constant threat of data breaches

code

How to encrypt large files

CipherStor is blazingly fast! Here we show how to use it within your data-flow pipeline to maintain high performance when encrypting large files.

Company

  • Executive Team
  • Contact us

Legal

  • Terms of Service
  • Privacy Policy

Social

  • Twitter
  • Facebook
  • LinkedIn

© Crypteron™ 2013 and protected by one or more patents.
Crypteron, CipherDB, CipherStor, CipherObject, TotalAuth and DosCipher are all trademarks of Crypteron Inc. All rights reserved.

Try Crypteron for Free!

Registration is almost complete! We sent an email to:

Please check your email to activate your account. If you do not receive an email, please contact support.