Skip to main content
NIST 800-171 Certified·CMMC 2.0 Level 2 Certified·FIPS 140-3 Compliant

Take Control of Your Data

tiCrypt gives universities, research institutions, and federal contractors a turnkey secure computing environment — with end-to-end encrypted VMs, SLURM cluster integration, and compliance built in from day one.

Compliance & Certifications

NIST 800-171Certified
CMMC 2.0 Level 2Certified
FIPS 140-3Compliant

Platform Capabilities

Everything You Need in a Secure Enclave

tiCrypt combines cryptographic security, compliance certifications, and research-grade compute — in one unified platform.

End-to-End Encryption

End-to-End Encryption

Every user, file, and resource is protected by unique RSA-2048 public-private key pairs. Cryptographic control stays with the data owner — always.

User-Owned Security

User-Owned Security

Administrators cannot access user data. Each researcher holds their own keys, fully owning and controlling their secure workspace.

Standalone Secure VMs

Standalone Secure VMs

Deploy fully isolated virtual machines with encrypted drives, locked-down networking, and fully audited access.

SLURM Integration

SLURM Integration

Submit HPC jobs to SLURM-managed clusters directly from within the enclave — combining enclave-grade security with high-performance computing.

Compliance by Design

Compliance by Design

CMMC 2.0 Level 2 Certified, NIST 800-171 Certified, and FIPS 140-3 Compliant — compliance is the foundation of tiCrypt, not an afterthought.

Multi-Institution Management

Multi-Institution Management

Manage users, projects, and data across departments and institutions with role-based access, sub-admin delegation, and full audit trails.

Virtual Machines & HPC

Isolated VMs and SLURM — Together

tiCrypt integrates directly with SLURM, letting researchers submit jobs from within secure virtual machines — delivering the familiar on-demand HPC experience without moving sensitive data outside the enclave.

  • Standalone VMs on Libvirt (KVM/QEMU) or bare metal
  • SLURM job submission from within the enclave
  • Encrypted drives per VM with LUKS (Linux) or BitLocker (Windows)
  • Full VM session audit trail — every action logged
Isolated VMs and SLURM — Together

Compliance & Certification

CMMC 2.0 Level 2 Certified. NIST 800-171 Certified.

tiCrypt is purpose-built for researchers handling Controlled Unclassified Information (CUI), federal grant data, and ITAR-regulated research. With CMMC 2.0 Level 2 certification, NIST 800-171 certification, and FIPS 140-3 compliant cryptography, it provides the compliance posture institutions need to win and retain federal funding.

  • CMMC 2.0 Level 2 Certified
  • NIST 800-171 Certified
  • FIPS 140-3 Compliant Cryptography
  • Role-based access control with escrow key recovery
  • Comprehensive audit logging for compliance reporting
CMMC 2.0 Level 2 Certified. NIST 800-171 Certified.

Security Architecture

Zero-Trust, User-Owned Data Model

Unlike cloud platforms where the provider holds the keys, tiCrypt implements a zero-trust, user-owned security model. Each user holds their own RSA-2048 key pair — administrators cannot read user data, by design.

This architecture is a requirement across federal compliance frameworks. tiCrypt makes it the default, not a configuration option.

  • Individual RSA-2048 public-private key pairs per user
  • Administrators cannot access user data — by design
  • Key escrow with multi-party approval for authorized recovery
  • End-to-end encrypted file vault
  • Private key never transmitted over the network
Zero-Trust, User-Owned Data Model

Who Uses tiCrypt

Built for the Most Demanding Research Environments

From research universities to defense contractors and national labs, tiCrypt is the trusted secure enclave for institutions that cannot afford to compromise.

Research Universities

Win Federal Grants. Keep CUI Secure.

Provide researchers with a CMMC-ready environment that satisfies DoD, NSF, NIH, and DHS data handling requirements — out of the box.

  • DoD-funded research (DFARS / CUI)
  • NIH and NSF sensitive data compliance
  • Multi-PI collaboration with data isolation
  • Institutional compliance reporting
Defense Contractors & FFRDCs

ITAR-Compatible. Audit-Ready.

Meet the security posture required for ITAR-regulated projects, classified-adjacent research, and federal contract compliance.

  • Full audit trail for contract reporting
  • No notion of non-audited actions within the environment
  • Umbrella compliance via project isolation
HPC & Computational Research

Secure HPC Without Compromise.

Combine the power of SLURM-managed clusters with the security guarantees of a certified enclave — no tradeoffs between speed and compliance.

  • SLURM job submission inside the enclave
  • Encrypted scratch storage for batch jobs
  • VM-based interactive compute sessions
  • Secure data ingestion via write-only SFTP

Ready to Secure Your Research?

Join the growing community of universities and research institutions using tiCrypt to protect sensitive data, meet compliance requirements, and empower researchers to do their best work.