Pricing & Plans

Crypteron adds military-grade data security to your backend C# and Java applications with just a couple lines of code.


Community

$0

per month

Try It Free

$0

per year

Try It Free

Professional

$499

per month

Try It Free

$5,489

per year

Try It Free

Enterprise

Try It Free

All plans include:

top_secret

Military-grade encryption and tamper protection

Your application's sensitive data is automatically signed and secured with AES-GCM encryption. This prevents anyone from viewing or tampering with your data even if your database is breached.

Complete encryption key management

Crypteron stores your encryption keys off-site and protects them with  elliptic curve cryptography. Key distribution, usage and caching are handled automatically. No custom code required!

Developer integrations for ALL data types

Crypteron has C# and Java integrations that are able to secure all types of data, including SQL, NoSQL, objects, files, streams and more.

One-click response to data breaches

Crypteron lets you "pause" your app within our management dashboard. This shuts down all encryption and decryption operations allowing you to assess the scope of a data breach.

Try any plan FREE for 30-days! No strings attached. You can change plans at any time

Pricing & Plans FAQ

What is the Community Edition?

We built the Community Edition of Crypteron so that ANYONE can create a secure .NET or Java backend application in a fraction of the time. We were tired of hearing about organizations losing valuable and critical data due to insecure code and bad data security practices so we decided to share our developer-friendly security platform with the world...for free! [Learn More]

The Community Edition uses AES-128. Is that secure?

Absolutely! As the folks at 1Password put it, the difference between zero and zero is zero. AES-128 is currently unbreakable. AES-256 is twice as unbreakable. AES-256 is also future proof against advancements in quantum computing which is why the NSA requires it to secure data deemed as "TOP SECRET." If your application is dealing with that level of compliance, we recommend going with one of our premium plans.

What is a security partition?

Segmentation is a key component of robust data security. Crypteron's management dashboard allows you to easily silo your sensitive data into different security partitions each with its own encryption key, set of access control rules, and audit log. You might, for example, create one security partition for billing data and another for medical data.

What is an access control rule?

An access control rule limits how different user roles access data within a security partition. Building off of the previous example, you might create an access control rule that allows users in accounting  to both encrypt and decrypt data within the billing security partition and create another that only allows users in nursing to decrypt data within the medical security partition.

What is an app?

An app refers to the backend / server-side application you are securing with Crypteron. Each app has its own set of security partitions and access control rules. Each app also has its own plan so you can mix and match different plans for different projects or clients. Our Business and Enterprise plans allow you to create multiple apps for the price of one, offering significant savings for organizations working on multiple projects.

What is a key rotation?

Data security best practices dictate that you should rotate your encryption keys regularly. In the past this was a massive operation. Crypteron makes it simple. You can rotate a security partition's encryption key with one click in the management dashboard. All of your existing data will continue to use the original key and any new data will use the key. You can also enable a feature that gradually migrates your old data to the new key automagically.

What does FIPS-140-2 Certified mean?

This stands for  Federal Information Processing Standard Publication 140-2, a US government standard for accrediting cryptographic modules. This certification allows you to use Crypteron on sensitive US government projects.

What hosting environments are supported?

All of them! Crypteron is 100% compatible with the public cloud, hybrid cloud or on-premises deployments. We even have a self-hosted Enterprise plan that requires no Internet connection at all. The entire security pipeline is tied to the application itself regardless of where it's hosted.

How does billing work?

If you're on the Community Edition, there is NO billing because it's 100% free. For our premium plans, Crypteron charges your credit card every month or every year depending on which option you choose for each app. You can mix and match different plans for different apps on different billing cycles. Enterprise plans should contact us for custom billing.

I still have questions!

No problem! We understand that this can seem tricky at first but we promise that it's incredibly easy to set up. Check out this demo video that walks you through securing SQL data in an ASP.NET app in just THREE MINUTES! And of course, please don't hesitate to email us directly or use the chat widget below. We're here to help!

Recent blog posts

Encryption, Entity Framework and Projections

We just got another email asking how Crypteron’s CipherDB encryption works with Entity Framework’s projections. So I decided it’s time to write a blog post about it. For starters, Crypteron works very well with Entity Framework. And for the most past Entity Framework works with – well – Entities. But there are some cases where […]

PCI DSS and key rotations simplified

PCI compliance requires data encryption keys to be changed frequently. Here is how you can do it easily.

Your data-center is not secure and what you can do about it

There is no secure perimeter anymore. Neither in your corporate network nor in your data center. Fight a winning battle armed with self-protecting data rather than a losing one trying to protecting the infrastructure.

Introducing the Crypteron Startup Innovators Program

Qualifying startups get up to 50% off all plans. Tell us how you’re changing the world and the our Startup Innovators Program will support your journey.

6 encryption mistakes that lead to data breaches

If encryption is so unbreakable, why do businesses and governments keep getting hacked? Six common encryption mistakes that lead to data breaches.

Announcing the new Crypteron Community Edition

Starting today you can now sign up for the Crypteron Community Edition for free with no performance limitations.

Data breach response – One click to save your business

Get breathing room – when you need it the most. Respond to a data breach with a single click.

Why We Need Proper Data-At-Rest Encryption: 191M U.S. Voters’ Data Exposed

Adding security at the application level is a large step forward in protecting data from the constant threat of data breaches

How to encrypt large files

CipherStor is blazingly fast! Here we show how to use it within your data-flow pipeline to maintain high performance when encrypting large files.

Crypteron CipherStor Performance Benchmarks

Blazing fast performance by Crypteron CipherStor that hits several gigabytes/sec enabling security even in high bandwidth scenarios