Skip to main content
Developed by Tera Insights in collaboration with the University of Florida
NIST 800-171 Certified·CMMC 2.0 Level 2 Certified·FIPS 140-3 Compliant

Take Control of Your Data

Compliance shouldn't be a research project in itself. tiCrypt delivers a turnkey secure enclave where researchers can securely store, share, and analyze restricted data inside isolated VMs or submit jobs via native SLURM integration, all within tiCrypt.

Read Whitepaper
0+Researchers
0+Unique Research Projects
0M+Grant Funding

The tiCrypt Platform

Your Data Is Restricted. Your Research Shouldn't Be.

One platform for encrypted storage, secure virtual machines, and CMMC/NIST compliant batch processing. Purpose-built for the most demanding security requirements without sacrificing the workflows researchers depend on.

Encryption Done Right

tiCrypt is built on user-centric security. Every user holds their own RSA-2048 key pair, and all drives, files, and data are end-to-end encrypted with AES-256. Administrators cannot access user data unless explicitly shared.

  • RSA-2048 key pairs generated at registration, the private key never leaves the user
  • All authentication based on digital signatures, not stored credentials
  • AES-256 encryption managed through PKI for every file and drive
  • Without the decryption key, stored data is useless, even to administrators
Encryption Done Right

Our Origin

Developed for Researchers, by Researchers

Crafted in collaboration with the University of Florida, tiCrypt acknowledges the unique and diverse workflows inherent in research projects. Thousands of hours of feedback from faculty, lab administrators, principal investigators, post-doc students, research computing staff, and university compliance officers shaped the development process.

This collaborative approach ensures that tiCrypt is finely tuned to cater to the specific needs of the research community — providing a tailored solution for seamless integration into a variety of research workflows and processes.

1000sHours of researcher and system administrator feedback
8+Full scale R1 deployments and counting
0Compromises on data security

Who Uses tiCrypt

Built for the Most Demanding Research Environments

From research universities to defense contractors and national labs, tiCrypt is the trusted secure enclave for institutions that cannot afford to compromise.

Research Universities

Win Federal Grants. Keep CUI Secure.

Provide researchers with a CMMC-ready environment that satisfies DoD, NSF, NIH, and DHS data handling requirements — out of the box.

  • DoD-funded research (DFARS / CUI)
  • NIH and NSF sensitive data compliance
  • Multi-PI collaboration with data isolation
  • Institutional compliance reporting
Defense Contractors & FFRDCs

ITAR-Compatible. Audit-Ready.

Meet the security posture required for ITAR-regulated projects, classified-adjacent research, and federal contract compliance.

  • Full audit trail for contract reporting
  • No notion of non-audited actions within the environment
  • Umbrella compliance via project isolation
HPC & Computational Research

Secure HPC Without Compromise.

Combine the power of SLURM-managed clusters with the security guarantees of a certified enclave — no tradeoffs between speed and compliance.

  • SLURM job submission inside the enclave
  • Encrypted scratch storage for batch jobs
  • VM-based interactive compute sessions
  • Secure data ingestion via write-only SFTP

What Experts Are Saying

Independently Validated Security

"

Our independent security review and penetration test of tiCrypt revealed an exceptionally strong, defense-in-depth architecture aligned with NIST SP 800-171. The platform incorporates non-default security design choices not commonly encountered in comparable systems. We were particularly impressed by the overall security architecture and the team's responsiveness.

Guillermo Munoz, M.A., CISSP, CEHSenior Information Security ArchitectHarvard Medical School
"

We have been working with Tera Insights for about a decade on building a computing environment for working with restricted data that is flexible, highly secure, and straightforward to manage. With constant feedback from researchers, the environment has matured to meet the demands of very complex workflows.

Dr. Erik Deumens, PhDSenior Director, UFIT Research ComputingUniversity of Florida
"

Our independent security review and penetration test of tiCrypt revealed an exceptionally strong, defense-in-depth architecture aligned with NIST SP 800-171. The platform incorporates non-default security design choices not commonly encountered in comparable systems. We were particularly impressed by the overall security architecture and the team's responsiveness.

Guillermo Munoz, M.A., CISSP, CEHSenior Information Security ArchitectHarvard Medical School
"

We have been working with Tera Insights for about a decade on building a computing environment for working with restricted data that is flexible, highly secure, and straightforward to manage. With constant feedback from researchers, the environment has matured to meet the demands of very complex workflows.

Dr. Erik Deumens, PhDSenior Director, UFIT Research ComputingUniversity of Florida

Take Control of Your Data

Join the growing community of universities, national labs, and medical centers using tiCrypt to protect sensitive data, meet compliance requirements, and empower researchers to do their best work.