Matomo

Hermes – end-to-end secure data storage

🇺🇦 We stand with Ukraine, and we stand for Ukraine. We offer free assessment and mitigation services to improve Ukrainian companies security resilience.

A simple way of collaborating on end-to-end encrypted data

  • tab 0 icon 1
    Secure granular CRUD

    Secure granular CRUD

    Let multiple users collaborate on shared data structures with granular access control and key management over each data block, while enforcing different cryptographic protections on all CRUD operations.

    Zero-trust ACL

    Zero-trust ACL

    Traditional access control has ACL lists and ACL engine that enforces access rights, which you have to trust. In Hermes, access rights are enforced cryptographically, so you don’t have to trust anything to be sure that no one unwanted has access to the data.

    Convenient storage

    Convenient storage

    Data is stored encrypted, but does not require re-encryption during changing the access rights, key revocation or planned key rotation. Convenient data model allows to integrate Hermes with different architectures and storage schemes.

Industries

Hermes’ unique capabilities are the best to protect shared structured documents, where different fields have different security risks and access control patterns.

Advanced use-cases

Get started with Hermes

Contact us

Get whitepaper

Apply for the position

Our team will review your resume and provide feedback
within 5 business days

Thank you!
We’ve received your request and will respond soon.
Your resume has been sent!
Our team will review your resume and provide feedback
within 5 business days