Matomo

Database encryption solutions

🇺🇦 We stand with Ukraine, and we stand for Ukraine. We offer free assessment and mitigation services to improve Ukrainian companies security resilience.

Solution

Database encryption solutions

Database encryption aims to protect sensitive data from attackers, comply with industry regulations and secure data processing requirements. Modern approaches to database encryption go beyond simply ticking a checkbox “data at rest encryption” but using column level encryption or field level encryption.

Cossack Labs offers tools and services to cover database encryption requirements. Our software allows encrypting data transparently for the database and the client applications – ensuring that sensitive data fields are written encrypted to the database and then decrypted when read. Encrypting data before it gets to the database protects against insiders, leaks and misconfiguration.

Typical database encryption requirements

//

Follow data privacy regulations

//

Solve insiders risks & misconfiguration

//

Encrypt data with minimum work

//

Zero code changes

Modern database encryption solutions

Encrypted, yet searchable data

Stack compatibility

Plug-and-play encryption SDK

Database encryption methods #

Different database encryption methods provide various security guarantees. Acra field level encryption works transparently for the app and the database, requires zero application code changes and hides cryptographic details from developers.

Database at-rest encryption

Encryption of

The whole database

Access to encryption keys

The database

Plaintext leakage from DBAs

Yes

Plaintext leakage from backups

Yes

Number of keys

One for the whole database

Application code changes

None

Microsoft / Oracle TDE

Encryption of

The whole database

Access to encryption keys

The database

Plaintext leakage from DBAs

Yes

Plaintext leakage from backups

Yes

Number of keys

One for the whole database

Application code changes

None

Client-side field level encryption

Encryption of

Selected sensitive fields

Access to encryption keys

Client app

Plaintext leakage from DBAs

No
data is encrypted before it gets to the database

Plaintext leakage from backups

No
data is encrypted before it gets to the backup

Number of keys

Per field, per app

Application code changes

Significant

Encryption of

Selected sensitive fields

Access to encryption keys

Acra

Plaintext leakage from DBAs

No
data is encrypted before it gets to the database

Plaintext leakage from backups

No
data is encrypted before it gets to the backup

Number of keys

Per field, per app, per zone

Application code changes

None, or very small

Our mission is simple.

We help you focus on serving your customers better, while relieving your team from security engineering pains and making your users confident that their data is safe with you.

Our offerings

// Database encryption software

Acra

A DATABASE SECURITY SUITE
Acra offers a field level and searchable database encryption which is easy-to-integrate in already-built infrastructures. Acra works with SQL and NoSQL databases. Acra gives transparent field level encryption proxy and encryption-as-an-API service.

To be announced

There’s something we’re preparing to address new challenges – Please stay tuned for further announcements.

// Consulting

Security engineering & architecture

Our security engineers team will assist with integrating field level encryption for sensitive data in your infrastructure (re-design the dataflow, optimise SQL queries, ensure HA and load balancing, migrate data, etc.) to mitigate the risks of data leakage.

Multi-layered defenses

Encryption never comes alone. We will advise you on data migration, key management, designing application level encryption flow, implementing certain security features, assessing your product, verifying its security properties, and providing actionable advisory on improvements.

SSDLC

We help teams set up and improve the SSDLC for application development. We assist in prioritising and implementing security features, suggest automated tools and follow the latest security guidelines and regulations.

Have a question? Get a human to answer it!

How we make a difference

The data is always yours

Reduce business risks with consulting

Database encryption for SQL, NoSQL and KV data stores

Fast time to solution

Database encryption in use

Additional relevant materials

Frequently Asked Questions

How are databases encrypted?

Does database encryption affect performance?

Should database data be encrypted?

For innovators, by innovators

We've started Cossack Labs to develop new tools and methods for protecting the data and enabling novel solutions to emerging problems — so that at the edge of your innovation, you’ve already got fitting tools handy.

Contact us

There are many ways we can help: with our products, bespoke solutions, and engineering services. Leave your contact information to connect with our team:

Contact us

Get whitepaper

Apply for the position

Our team will review your resume and provide feedback
within 5 business days

Thank you!
We’ve received your request and will respond soon.
Your resume has been sent!
Our team will review your resume and provide feedback
within 5 business days