Take Control of Your Data
Compliance shouldn't be a research project in itself. tiCrypt delivers a turnkey secure enclave where researchers can securely store, share, and analyze restricted data inside isolated VMs or submit jobs via native SLURM integration, all within tiCrypt.
The tiCrypt Platform
Your Data Is Restricted. Your Research Shouldn't Be.
One platform for encrypted storage, secure virtual machines, and CMMC/NIST compliant batch processing. Purpose-built for the most demanding security requirements without sacrificing the workflows researchers depend on.
Encryption Done Right
tiCrypt is built on user-centric security. Every user holds their own RSA-2048 key pair, and all drives, files, and data are end-to-end encrypted with AES-256. Administrators cannot access user data unless explicitly shared.
- RSA-2048 key pairs generated at registration, the private key never leaves the user
- All authentication based on digital signatures, not stored credentials
- AES-256 encryption managed through PKI for every file and drive
- Without the decryption key, stored data is useless, even to administrators

Our Origin
Developed for Researchers, by Researchers
Crafted in collaboration with the University of Florida, tiCrypt acknowledges the unique and diverse workflows inherent in research projects. Thousands of hours of feedback from faculty, lab administrators, principal investigators, post-doc students, research computing staff, and university compliance officers shaped the development process.
This collaborative approach ensures that tiCrypt is finely tuned to cater to the specific needs of the research community — providing a tailored solution for seamless integration into a variety of research workflows and processes.
Who Uses tiCrypt
Built for the Most Demanding Research Environments
From research universities to defense contractors and national labs, tiCrypt is the trusted secure enclave for institutions that cannot afford to compromise.
Win Federal Grants. Keep CUI Secure.
Provide researchers with a CMMC-ready environment that satisfies DoD, NSF, NIH, and DHS data handling requirements — out of the box.
- DoD-funded research (DFARS / CUI)
- NIH and NSF sensitive data compliance
- Multi-PI collaboration with data isolation
- Institutional compliance reporting
ITAR-Compatible. Audit-Ready.
Meet the security posture required for ITAR-regulated projects, classified-adjacent research, and federal contract compliance.
- Full audit trail for contract reporting
- No notion of non-audited actions within the environment
- Umbrella compliance via project isolation
Secure HPC Without Compromise.
Combine the power of SLURM-managed clusters with the security guarantees of a certified enclave — no tradeoffs between speed and compliance.
- SLURM job submission inside the enclave
- Encrypted scratch storage for batch jobs
- VM-based interactive compute sessions
- Secure data ingestion via write-only SFTP
What Experts Are Saying
Independently Validated Security
"Our independent security review and penetration test of tiCrypt revealed an exceptionally strong, defense-in-depth architecture aligned with NIST SP 800-171. The platform incorporates non-default security design choices not commonly encountered in comparable systems. We were particularly impressed by the overall security architecture and the team's responsiveness.
"We have been working with Tera Insights for about a decade on building a computing environment for working with restricted data that is flexible, highly secure, and straightforward to manage. With constant feedback from researchers, the environment has matured to meet the demands of very complex workflows.
"Our independent security review and penetration test of tiCrypt revealed an exceptionally strong, defense-in-depth architecture aligned with NIST SP 800-171. The platform incorporates non-default security design choices not commonly encountered in comparable systems. We were particularly impressed by the overall security architecture and the team's responsiveness.
"We have been working with Tera Insights for about a decade on building a computing environment for working with restricted data that is flexible, highly secure, and straightforward to manage. With constant feedback from researchers, the environment has matured to meet the demands of very complex workflows.
Take Control of Your Data
Join the growing community of universities, national labs, and medical centers using tiCrypt to protect sensitive data, meet compliance requirements, and empower researchers to do their best work.