CipherStash

CipherStash

IT Services and IT Consulting

Protect data. Not just systems.

About us

Data is valuable. It’s what your business runs on. It’s your most important asset after your people. We all have an obligation and a business need to protect data. At CipherStash, we believe that data confidentiality and security is a fundamental human right, as well as a business imperative. And that protecting data shouldn’t slow down your business. CipherStash: Protect data. Not just systems.

Website
https://cipherstash.com
Industry
IT Services and IT Consulting
Company size
11-50 employees
Headquarters
Sydney
Type
Privately Held
Founded
2020
Specialties
encryption, cyber security, and data protection

Locations

Employees at CipherStash

Updates

  • View organization page for CipherStash, graphic

    1,543 followers

    To coincide with #RSA2024, today we are launching CipherStash Proxy: the last database proxy you'll ever need. Initially available for Postgres, Proxy includes 3 modules: ✅ AUDIT: which logs every database statement, identifies unusual query patterns and even records exactly which records and fields are returned in queries. ✅ IDENTIFY: which makes Proxy Identity aware by integrating with the likes of Auth0, Okta and Ping. Audit traces include exactly who accesses what data even for the end-users of your application. ✅ ENCRYPT: protects sensitive data with field-level encryption-in-use that supports SQL queries via fast, scalable searchable encryption. Proxy can also replace your existing PGBouncer or PG Pool service and supports load balancing, sharding and connection pooling. Its also almost 2x as fast as PGBouncer. Install Proxy via a Docker container and get started in minutes. No code required. You don't even have to talk to sales! https://cipherstash.com

    CipherStash

    CipherStash

    cipherstash.com

  • View organization page for CipherStash, graphic

    1,543 followers

    The Four Principals of Data Protection: Part Three: Authorise Every Action 🛂 Encryption-in-use ensures policy effectiveness 💯 By embedding identity and authorization into the decryption process, Encryption-in-Use provides reliable and effective policy enforcement with broad coverage. To take full advantage of this approach, authorization decisions must be made based on the end user identity (i.e. originating party) and not just a service or application. ✅ Encryption-in-Use expands solution coverage ❌ Traditional system based access controls have limited coverage ✅ Encryption-in-use means data is protected by default Encryption-in-use protects data by default providing base-level coverage regardless of context. Read the full WhitePaper: Safeguarding Data with Encryption-in-use here: https://lnkd.in/eRsBK3aE

    • No alternative text description for this image
  • View organization page for CipherStash, graphic

    1,543 followers

    The Four Principals of Data Protection: Part Two: Minimise the Trust Boundary Minimizing the scope of any granted access to only the essential is fundamental to data security and protecting against over-access and insider threats. Access specifics are equally important. Who should have access? Which records or fields should be accessible? Should queries be allowed at any time, only during certain times of day or for a limited period? Minimizing the trust boundary provides access strictly on a needs-to-know-basis. It extends only the least privilege required for a user to achieve their goal and mitigates unwanted data access. Who, What, When and Where: 👤 Who legitimately needs access? 🗄 What data should be accessible? 💻 Where should data be accessible? ⏰ When is access is appropriate? Encryption-in-use enables fine-grained access control directly at the data level. Contextual information is locked cryptographically, in a compact data format ensuring that access control is always correct. If you want to read more on the series plus more insights from 💻Dan Draper you can download the White Paper here: https://lnkd.in/eRsBK3aE #cybersecurity #data #postgres #ciso #security #encryption

    • No alternative text description for this image
  • View organization page for CipherStash, graphic

    1,543 followers

    In a world of increasing insider threats and attacks on employees, ever growing regulatory scrutiny and complex, distributed IT infrastructure, Data Protection becomes a significant challenge. Over the coming days we will share how CipherStash is using encryption in use technology to enhance your data protection. Traditional data protection relies on controlling access to the systems where data is stored. While providing some protection, this approach is limited because it requires that every system be configured correctly and consistently. Protecting data directly with encryption-in-use makes controls independent of any specific system. For example System Protection Policies: ❗ Must be for every possible system ❗ System variability makes consistent policy application difficult ❗ Not all systems capable of enforcing target policies Whereas Data Protection Policies: ✅ Defined them once and apply them universally. 💯 Want to learn more - Read the full Whitepaper by 💻Dan Draper here: https://lnkd.in/eRsBK3aE If you want to chat to us then please drop a line to [email protected] #security #encryption #data #cybersecurity #protection

    • No alternative text description for this image
  • View organization page for CipherStash, graphic

    1,543 followers

    We have made it even easier to access and use CipherStash, we announce the availability of CipherStash on Amazon Marketplace!   Why CipherStash CipherStash Proxy is designed for organisations who run applications where sensitive data is stored in a PostgreSQL database. We provide granular protection, detailed logging and fine-grained access control. Specific use cases include: demonstrating compliance with regulatory requirements, mitigating the risk of operator access to data; and increased visibility of data access patterns Who is it for? Industries where we see customers wanting to solve this data protection problem most often appear in: Healthcare 🏥 Financial services (including insurance) 🏦 Marketing and HR 👩💻 Cybersecurity, data storage, warehousing and analytics companies 🗄 Find us on the AWS Marketplace here: https://lnkd.in/eSy88kMG #aws #awsmarketplace #cipherstash #cybersecurity #pgcat #postgresql

    • No alternative text description for this image
  • View organization page for CipherStash, graphic

    1,543 followers

    CipherStash is now available via the AWS Marketplace! See about the announcement below from our CISO Paul Hawkins. #aws #security #ciso #encryption

    View profile for Paul Hawkins, graphic

    CISO, CipherStash

    You can now get access to CipherStash Proxy via the AWS Marketplace. Check out the listing here: https://lnkd.in/g4UTqtpG From increased visibility on the actual data access patterns to protecting sensitive parts of your data using searchable encryption you can get started from $0. For more details including our pricing calculator, getting started docs & the deeper dive paper head over to https://cipherstash.com/. CipherStash can help security folks raise the bar for data protection while keeping the friction low for developers & application owners. The beauty of consuming via the AWS Marketplace is that it will be a line item on your AWS bill. #AWS #security #marketplace #dataProtection #encryption

    CipherStash Proxy

    CipherStash Proxy

    aws.amazon.com

  • View organization page for CipherStash, graphic

    1,543 followers

    CipherStash stops the leading cause of data breaches: compromised employee accounts with excessive data access permissions.   According to the Ponemon Institute, over 90% of data breaches involve the ‘human factor'. Complicating this problem is the fact that it is very difficult to tell when access is made by a legitimate user accounts acting on their own behalf, or a legitimate user account that has been compromised.   CipherStash solves this challenge by addressing two fundamentals: ✅ We make it simple to lock data down (only people who need access) ✅ We can guarantee that every access is recorded and by whom Combining sophisticated logging and authentication checks, CipherStash gives businesses the capability to detect suspicious data access and rapidly lock down attempted breaches at unprecedented speed.   CipherStash has a free forever tier available here, or if you prefer you can contact us to discuss further. https://lnkd.in/em5RhrQ6 #security #data #postgres #cybersecurity

    • No alternative text description for this image
  • View organization page for CipherStash, graphic

    1,543 followers

    Read the interview between 💻Dan Draper and Amit Chowdhry at Pulse 2.0! Learn why CipherStash was built and why it is important to today's needs for the security of your data and how we are evolving. 💻Dan affirms why we are different from the competition: "CipherStash provides protection directly to data itself, not just the system or application in which it’s stored. That means when traditional access controls fail (or were not in place to begin with!), data is still protected." "Traditional encryption is notoriously hard to implement and scale. Our tech just works and can scale to Terabytes of data with ease." Click the image below for the full article. #datasecurity #encryption #security #postgres #b2b

    CipherStash: How This Company Helps Alleviate The Leading Cause Of Data Breaches

    CipherStash: How This Company Helps Alleviate The Leading Cause Of Data Breaches

    https://pulse2.com

  • View organization page for CipherStash, graphic

    1,543 followers

    CipherStash Proxy enables you to audit every query and corresponding data access, protect data with searchable encryption, and enforce fine-grained access controls. With CipherStash Proxy, an encryption layer protects data. Even with compromised credentials, CipherStash Proxy secures data, enhancing system security. Encryption-in-Use and fine-grained identity and access control deepen your data's defences, significantly reducing the chances of a breach. ✅ Your infrastructure: CipherStash runs privately in your cloud or on-prem ✅No code required: No changes required to existing apps, integrations, or data analysis workflows. ✅Data integrity protection: Using cryptographic tags which verify that data has not been modified. Create an account: Start a 14-day free trial, no credit card required. https://lnkd.in/em5RhrQ6

    • No alternative text description for this image

Similar pages

Browse jobs

Funding

CipherStash 3 total rounds

Last Round

Seed

US$ 3.0M

Investors

Skip Capital
See more info on crunchbase