Take Control of Your Data
Compliance shouldn't be a research project in itself. tiCrypt delivers a turnkey secure enclave where researchers can securely store, share, and analyze restricted data inside isolated VMs or submit jobs via native SLURM integration, all within tiCrypt.
The tiCrypt Platform
Your Data Is Restricted. Your Research Shouldn't Be.
One platform for encrypted storage, secure virtual machines, and CMMC/NIST compliant batch processing. Purpose-built for the most demanding security requirements without sacrificing the workflows researchers depend on.
Encryption Done Right
tiCrypt leverages strong symmetric and asymmetric cryptography to provide end-to-end encryption for secure file access, sharing, and processing. Public-key cryptography is the foundation on which all security features are built.
- Individual RSA-2048 key pairs per user
- Administrators cannot access user data — by design
- Private key never transmitted over the network
- Key escrow with multi-party approval for recovery

Our Origin
Developed for Researchers, by Researchers
Crafted in collaboration with the University of Florida, tiCrypt acknowledges the unique and diverse workflows inherent in research projects. Thousands of hours of feedback from faculty, lab administrators, principal investigators, post-doc students, research computing staff, and university compliance officers shaped the development process.
This collaborative approach ensures that tiCrypt is finely tuned to cater to the specific needs of the research community — providing a tailored solution for seamless integration into a variety of research workflows and processes.
Who Uses tiCrypt
Built for the Most Demanding Research Environments
From research universities to defense contractors and national labs, tiCrypt is the trusted secure enclave for institutions that cannot afford to compromise.
Win Federal Grants. Keep CUI Secure.
Provide researchers with a CMMC-ready environment that satisfies DoD, NSF, NIH, and DHS data handling requirements — out of the box.
- DoD-funded research (DFARS / CUI)
- NIH and NSF sensitive data compliance
- Multi-PI collaboration with data isolation
- Institutional compliance reporting
ITAR-Compatible. Audit-Ready.
Meet the security posture required for ITAR-regulated projects, classified-adjacent research, and federal contract compliance.
- Full audit trail for contract reporting
- No notion of non-audited actions within the environment
- Umbrella compliance via project isolation
Secure HPC Without Compromise.
Combine the power of SLURM-managed clusters with the security guarantees of a certified enclave — no tradeoffs between speed and compliance.
- SLURM job submission inside the enclave
- Encrypted scratch storage for batch jobs
- VM-based interactive compute sessions
- Secure data ingestion via write-only SFTP
What Experts Are Saying
Independently Validated Security
"Our independent security review and penetration test of tiCrypt revealed an exceptionally strong, defense-in-depth architecture aligned with NIST SP 800-171. The platform incorporates non-default security design choices not commonly encountered in comparable systems. We were particularly impressed by the overall security architecture and the team's responsiveness.
Take Control of Your Data
Join the growing community of universities, national labs, and medical centers using tiCrypt to protect sensitive data, meet compliance requirements, and empower researchers to do their best work.