Secure your data
in a way that fits you
All of our security products are open-core. It means that all cryptographic code is open source, but many enterprise conveniences are licenced under a commercial licence.
Our products take many forms, but the entire ecosystem addresses the same issue: convenient, robust, and modern data protection.
Themis
A CROSS PLATFORM CRYPTO LIBRARY
Themis provides easy-to-use and hard-to-misuse encryption API for securing data at rest and in transit, and is available across multiple platforms.
Works best with:
Multi-platform apps, mobile apps, document exchange, chats.
Industries:
Finance, Healthcare and wellness, B2C, SaaS.
Solves:
90% typical use cases related to secure data storage and transmission.
Platforms: Mobile, Web, Electron, WASM, IoT, On prem, Cloud
Licensing: Open-source Apache 2.0
Form-factors: In-app SDK
Acra
A DATABASE SECURITY SUITE
Acra provides application level encryption, masking, tokenisation, access control, database leakage prevention, and intrusion detection for modern data-processing apps.
Works best with:
SQL/NoSQL databases, API services, web apps, telemetry systems.
Industries:
Finance, Critical infrastructure, Healthcare, B2B, SaaS.
Solves:
Encrypted data storage and processing with searchable encryption.
Platforms: Database, Cloud, On prem, IoT, Web
Licensing: Open-source Apache 2.0, Proprietary
Form-factors: API service, SQL proxy, DAO, In-app SDK
Hermes
END-TO-END SECURE DATA STORAGE
Hermes is end-to-end secure data storage that provides processing and sharing framework with zero trust to storage/exchange infrastructure.
Works best with:
Distributed apps, EHR systems, document exchange.
Industries:
Finance and banking, Critical infrastructure, Healthcare, B2B, Blockchain.
Solves:
End-to-end encrypted data collaboration and cryptographic access control.
Platforms: Web, On prem, Cloud
Licensing: Open-source AGPL 3.0
Form-factors: In-app SDK, DAO
Toughbase
Data management application platform built around Hermes, which provides end-to-end encrypted storage and sharing layer on top of traditional server infrastructure. Provides out-of-the-box tools to integrate Hermes with modern databases and distributed applications.
Works best with:
Large scale infrastructures, distributed apps, document exchange.
Industries:
Finance and banking, Critical infrastructure, Healthcare, B2B.
Solves:
End-to-end encrypted data collaboration within the whole infrastructure.
Platforms: Web, On prem, Cloud
Licensing: Proprietary
Form-factors: API service, DAO
THERE’S SOMETHING WE’RE PREPARING
Product security and stability
Your data is only yours
Until otherwise agreed, our products come as a “boxed” solution and are integrated with your apps and infrastructures.
Our software doesn't need any connections to our servers, doesn't have "admin" or "backup" keys, doesn't steal or send data “back home”.
Strong cryptography
Our products use strong modern audited cryptography under the hood: AES-GCM-256, AES-CTR-256, ECC + ECDSA, RSA + PSS + PKCS#7, ECDH, HPKE-like scheme, SMP-like scheme, PBKDF2, HMAC-SHA-256, ZRTP-KDF, etc.
Thanks to the modular architecture, it is possible to build custom flavors of Themis and Acra using crypto-primitives of your choice, like FIPS 140-2 or GOST-compatible.
Secure coding
Our software engineers are trained about secure architecture and secure coding, and write code based on platform-specific security guidelines, NIST publications, OWASP guides (SAMM, ASVS, MASVS, Cheatsheets) and security industry best practices.
Automated security testing
Our products heavily use automated security testing tools: static code analysers, fuzzing tools, memory analysers, unit tests (for each platform), end-to-end tests (to test the whole use cases), platform compatibility tests (to find compatibility issues between different platforms), version compatibility tests. For Themis, the estimated LoC of tests are 10x than LoC of the core code.
Tests run on every PR, every night and before releases.
Dependency management
We use dependency management tools to monitor 3rd party libraries used in our products, we triage notifications and update dependencies on an ongoing basis.
No analytics, no tracking
Our software doesn’t require internet access to operate, it has no “admin panel”, no debug routes, no built-in analytics or tracking, and no “insecure” mode.
You fully control it.
No spare keys
Once data is encrypted, only a party that has access to decryption keys, can decrypt it. We don’t have any “magical” spare keys. Store keys securely, or talk to us to use SSS-like schemes.
3rd party reviews
Each change in our products is being reviewed and approved by our internal team of software engineers and security engineers. For every change in the cryptographic layer, we perform internal audits by cryptographers who don’t work on our products, or external audits with world renowned cryptographic engineers. We work with reputable 3rd party security engineers to review security of our product on major releases.
Automated cryptography testing
The statistical test developed by NIST is used to verify the quality of pseudo-random number generators in the donor libraries. For symmetric encryption, we also run a selected set of NIST-recommended tests for AES-256. Such test sets contain both the initialisation vectors and the expected output.
Incident notification policy
In the event of finding a critical bug in products or their dependencies, patch is created and all customers are notified via their contact emails or by an agreed support channel. For open source users we post a GitHub issue and publish a new update, they can receive notification via GitHub according to their settings.
Product news
& latest releases
We follow a slow update cycle with urgent releases dealing with compatibility issues.