Take Control of Your Data
Compliance shouldn't be a research project in itself. tiCrypt delivers a turnkey secure enclave where researchers can securely store, share, and analyze restricted data inside isolated VMs or submit jobs via native SLURM integration, all within tiCrypt.
The tiCrypt Platform
Your Data Is Restricted. Your Research Shouldn't Be.
One platform for encrypted storage, secure virtual machines, and CMMC/NIST compliant batch processing. Purpose-built for the most demanding security requirements without sacrificing the workflows researchers depend on.
Encryption Done Right
tiCrypt is built on user-centric security. Every user holds their own RSA-2048 key pair, and all drives, files, and data are end-to-end encrypted with AES-256. Administrators cannot access user data unless explicitly shared.
- RSA-2048 key pairs generated at registration, the private key never leaves the user
- All authentication based on digital signatures, not stored credentials
- AES-256 encryption managed through PKI for every file and drive
- Without the decryption key, stored data is useless, even to administrators
Our Origin
Developed for Researchers, by Researchers
Crafted in collaboration with the University of Florida, tiCrypt acknowledges the unique and diverse workflows inherent in research projects. Thousands of hours of feedback from faculty, lab administrators, principal investigators, post-doc students, research computing staff, and university compliance officers shaped the development process.
This collaborative approach ensures that tiCrypt is finely tuned to cater to the specific needs of the research community — providing a tailored solution for seamless integration into a variety of research workflows and processes.
Who Uses tiCrypt
Built for the Most Demanding Research Environments
From research universities to defense contractors and national labs, tiCrypt is the trusted secure enclave for institutions that cannot afford to compromise.
Win Federal Grants. Keep CUI Secure.
Provide researchers with a CMMC-ready environment that satisfies DoD, NSF, NIH, and DHS data handling requirements — out of the box.
- DoD-funded research (DFARS / CUI)
- NIH and NSF sensitive data compliance
- Multi-PI collaboration with data isolation
- Institutional compliance reporting
ITAR-Compatible. Audit-Ready.
Meet the security posture required for ITAR-regulated projects, classified-adjacent research, and federal contract compliance.
- Full audit trail for contract reporting
- No notion of non-audited actions within the environment
- Umbrella compliance via project isolation
Secure HPC Without Compromise.
Combine the power of SLURM-managed clusters with the security guarantees of a certified enclave — no tradeoffs between speed and compliance.
- SLURM job submission inside the enclave
- Encrypted scratch storage for batch jobs
- VM-based interactive compute sessions
- Secure data ingestion via write-only SFTP
What Experts Are Saying
Independently Validated Security
"Our independent security review and penetration test of tiCrypt revealed an exceptionally strong, defense-in-depth architecture aligned with NIST SP 800-171. The platform incorporates non-default security design choices not commonly encountered in comparable systems. We were particularly impressed by the overall security architecture and the team's responsiveness.
"We have been working with Tera Insights for about a decade on building a computing environment for working with restricted data that is flexible, highly secure, and straightforward to manage. With constant feedback from researchers, the environment has matured to meet the demands of very complex workflows.
"After completing our penetration test of the tiCrypt LASER environment, we came away genuinely impressed. The platform reflects a layered, thoughtful security architecture built with compliance and protection at its core. For organizations working with sensitive data, tiCrypt is an exemplary model.
"Our tiCrypt environment has significantly improved collaboration between the college and hospital by providing researchers from both organizations a shared space to work with highly sensitive data. We have enjoyed watching the platform mature and continually improve. As we find new use cases, Tera Insights has been great to help us find solutions.
"Our independent security review and penetration test of tiCrypt revealed an exceptionally strong, defense-in-depth architecture aligned with NIST SP 800-171. The platform incorporates non-default security design choices not commonly encountered in comparable systems. We were particularly impressed by the overall security architecture and the team's responsiveness.
"We have been working with Tera Insights for about a decade on building a computing environment for working with restricted data that is flexible, highly secure, and straightforward to manage. With constant feedback from researchers, the environment has matured to meet the demands of very complex workflows.
"After completing our penetration test of the tiCrypt LASER environment, we came away genuinely impressed. The platform reflects a layered, thoughtful security architecture built with compliance and protection at its core. For organizations working with sensitive data, tiCrypt is an exemplary model.
"Our tiCrypt environment has significantly improved collaboration between the college and hospital by providing researchers from both organizations a shared space to work with highly sensitive data. We have enjoyed watching the platform mature and continually improve. As we find new use cases, Tera Insights has been great to help us find solutions.
Take Control of Your Data
Join the growing community of universities, national labs, and medical centers using tiCrypt to protect sensitive data, meet compliance requirements, and empower researchers to do their best work.