Take control of your data.

tiCrypt is a browser based application used to to securely sharem store data, and deploy VMs to do secure computation and analysis —all while meeting compliance regulations for NIST 800-53, NIST 800-171, and certain CMMC levels.

tiCrypt Backend 3.4.0 Release

This tiCrypt backend adds major functionality improvements and bug fixes.

Posted April 13, 2021 by Carlo Romo and Alin Dobra ‐ 1 min read

tiCrypt Backend 3.3.0 Release

This tiCrypt backend adds major functionality improvements and bug fixes.

Posted March 9, 2021 by Carlo Romo and Alin Dobra ‐ 3 min read

tiCrypt Backend 3.2.4 Release

This tiCrypt backend release bugs related to sub-admin role and never escrow flag.

Posted February 15, 2021 by Alin Dobra ‐ 1 min read

tiCrypt Features

Public-key Crypto based

tiCrypt uses public-key cryptography as the fundamental mechanism to implement all security measures. Authentication is public-key digital signature based; encryption uses public-key encryption as well.

Data confinment through encryption

All resources in tiCrypt are end-to-end encrypted with independent keys controlled by the users (not admins). This ensures data is cryptographically confined and available to only authorized users.

Secure File storage and sharing

tiCrypt Vault provides a secure mechanism to store and share files among users and groups.

Secure Forms

tiCrypt provides a convenient mechanism to securely aquire external data from surveys or othe data soruces. The built-in survey designer or custom webpages can be used for data acquisition.

Secure Virtual Machines

Interactive Windows and Linux virtual machines can be easily started and managed by users. They allow unlimited flexibility in establishing complex data processing workflows.

Secure Batch Processing

The batch processing facility in tiCrypt allows full utilization of the computational resources. Any available CPU resources not used by the interactive VMs can be used asynchronously using un-coupled and coupled batch processing. Jobs from trivially paralelizable to complex MPI and Hadoop/Spark can be securely executed.

Project Management

tiCrypt allows access to files and virtual machines to be restricted at project level. When combined with security levels, requirements and user ceertifications, projects allow unifor enforcement of various compliance requirements.

Full history audit

tiCrypt maintains a full history log audit that is block-chained and can recover all the past actions in the system. Alerts are extracted in real-time from the log and forensic queries allow reconstruction of past events.

Flexible Reporting

tiCrypt provides a customizable reporting mechanism based on the audit trail that allows all the complinance and operational reporting needs to be met

VIEW FULL DOCUMENTATION
Product Documentation

tiCrypt Connect

tiCrypt Connect is available for Mac, Windows and Linux. Its main purpose is to serurely deliver and automatically update tiCrypt front-end and to facilitate secure virtual machine connections and secure file transfers.

VIEW

tiCrypt Front-end

tiCrypt Front-end is the main tiCrypt interface. It allows ...

VIEW

tiCrypt Audit

tiCrypt Audit is the interface to the tiCrypt reporting, alerting and forensic tools.

VIEW