Frequently Asked Questions

NOTE: For questions regarding compliance and key management, please review of our Compliance FAQ

What SLA does Crypteron provide?

For the Crypteron managed security platform, paid plans have a 99.95% SLA with prorated service credit to customers. Free or trial plans do not have an SLA.

For the enterprise self-hosted plan, the customer organization is responsible for its own SLA.

For more details, view our complete Service Level Agreement.

What kind of encryption is used?

Crypteron secures your data with AES-128 and AES-256 encryption in GCM mode (96bit Tags) for privacy as well as tamper resistance. Encryption keys are themselves encrypted with elliptic curve cryptography at 256, 384 and 521 bits (stronger than RSA 15360-bits) certificate and private key to establish the root of trust (e.g. by security officer).

Where is the code or API documentation for Key Management?

Crypteron handles key management in a manner that is invisible and liberating to developers. With Crypteron, key management happens via the management dashboard GUI. This is by-design so developers can focus on customer delighting features rather than security/infrastructure plumbing. This surprises people used to extensive engineering just to do basic key management. No one liked doing that, so we made it obsolete. Crypteron automatically works when you modify ACLs on encryption keys or rollover encryption keys from the dashboard.

What is the performance cost of CipherDB?

The entire security pipeline of CipherDB adds less than 1 millisecond per record on average. View detailed benchmark results.

What databases are supported?

For automatically encrypting and decrypting structured data, CipherDB supports a wide range of databases.  If your database provider works with Entity Framework or Hibernate / JPA, chances are you can work with CipherDB right away. Please check with this list from Microsoft for the latest support status. Below we have a non-exhaustive representative list:

Objects that are encrypted with CipherObject can be persisted to any data store.

How do you migrate a CipherDB app from AES-128 to AES-256?

If you upgrade from a plan with AES-128 encryption to AES-256 encryption, you will have to issue a key rollover and restart your application. View detailed instructions.

What licenses does Crypteron use?

Crypteron uses several 3rd party licenses under the hood. View the comprehensive list.

Recent blog posts

Migrating existing live data into Crypteron

You’re already live in production. And you have sensitive in the clear. Read this article to see how Crypteron can help.

Encryption, Entity Framework and Projections

Projections in Entity Framework live outside the entity lifecycle. Read more to learn how your can use Crypteron to secure such data.

PCI DSS and key rotations simplified

PCI compliance requires data encryption keys to be changed frequently. Here is how you can do it easily.

Your data-center is not secure and what you can do about it

There is no secure perimeter anymore. Neither in your corporate network nor in your data center. Fight a winning battle armed with self-protecting data rather than a losing one trying to protecting the infrastructure.

Introducing the Crypteron Startup Innovators Program

Qualifying startups get up to 50% off all plans. Tell us how you’re changing the world and the our Startup Innovators Program will support your journey.

6 encryption mistakes that lead to data breaches

If encryption is so unbreakable, why do businesses and governments keep getting hacked? Six common encryption mistakes that lead to data breaches.

Announcing the new Crypteron Community Edition

Starting today you can now sign up for the Crypteron Community Edition for free with no performance limitations.

Data breach response – One click to save your business

Get breathing room – when you need it the most. Respond to a data breach with a single click.

Why We Need Proper Data-At-Rest Encryption: 191M U.S. Voters’ Data Exposed

Adding security at the application level is a large step forward in protecting data from the constant threat of data breaches

How to encrypt large files

CipherStor is blazingly fast! Here we show how to use it within your data-flow pipeline to maintain high performance when encrypting large files.