Matomo

Hermes – end-to-end secure data storage

🇺🇦 We stand with Ukraine, and we stand for Ukraine. We offer free assessment and mitigation services to improve Ukrainian companies security resilience.

Zero trust, end-to-end encrypted, secure data storage and sharing framework

Hermes

Zero trust, end-to-end encrypted, secure data storage and sharing framework

Enforce access control and facilitate sharing with end-to-end encryption via client-side SDK. Hermes provides cryptographically protected data processing and data collaborating without the need to re-encrypt an excessive amount of data.

A simple way of collaborating on end-to-end encrypted data

  • tab 0 icon 1 tab 0 icon 2
    Secure granular CRUD

    Secure granular CRUD

    Let multiple users collaborate on shared data structures with granular access control and key management over each data block, while enforcing different cryptographic protections on all CRUD operations.

    Zero-trust ACL

    Zero-trust ACL

    Traditional access control has ACL lists and ACL engine that enforces access rights, which you have to trust. In Hermes, access rights are enforced cryptographically, so you don’t have to trust anything to be sure that no one unwanted has access to the data.

    Convenient storage

    Convenient storage

    Data is stored encrypted, but does not require re-encryption during changing the access rights, key revocation or planned key rotation. Convenient data model allows to integrate Hermes with different architectures and storage schemes.

Industries

Hermes’ unique capabilities are the best to protect shared structured documents, where different fields have different security risks and access control patterns.

Finance

Finance

Store and process customer payment data and PII securely, minimise insider threats and enable secure, accountable cross-organisation data exchange.
Healthcare

Healthcare

Share FHIR and other medical records safely and distribute granular access to all entities in your system. Spend less on access control while gaining more fine-grained security.
Enterprise

Enterprise

Protect commercially sensitive data and enforce access control, integrate with existing PKI and IAM, enforce group policies and efficient key/storage management – all the while keeping the data end-to-end encrypted.

Advanced use-cases

Available for:

Get started with Hermes

See Hermes documentation for more info and how-tos

Contact us

Get whitepaper

Apply for the position

Our team will review your resume and provide feedback
within 5 business days

Thank you!
We’ve received your request and will respond soon.
Your resume has been sent!
Our team will review your resume and provide feedback
within 5 business days