Protect your data in the cloud and on-premise with our unique API. The API backed by trusted secure hardware processors where needed provides strong security foundations and data control.
The API simplicity ensures that your business complies with data protection laws, including the coming EU’s general data protection regulation (GDPR).
At briefings 26&27 July
OPENCRYPTO: Unchaining The Javacard Ecosystem
Enigma Bridge & University College London
Former Head of Security Architecture at Barclaycard
Compliance, control and reporting - real-time and regular reports of access to data and use of applications.
Short time-to-market by removing the complexity of data control.
Total cost of ownership delivered as managed service.
We protect, control the use, and safely handle keys to your data. Fully managed service provides flexibility and easy use.
Powerful visualization and reporting features. Visualization of data use improve your control of data and applications.
Integration tools hide all expert configuration. Developers just use data control and protection functions as any other business funtion.
Any cloud service needs physical security to equal on-premise systems. We use special-purpose hardware from leading vendors.
Data protection legal framework is expanding. European Union introduces GDPR that applies to all who offer services EU citizens and handle their data. Regardless of where your company is based, you will have to comply with this regulation from May 2018.
Enigma Bridge significantly simplifies compliance by its design: traceability of usage and access to data, logging, controlling physical location of secrets, bootstrapping recovery processes.
We are very proud on the architecture of our cloud service. It hides all the complexity of cryptography, load distribution, and resource management behind a simple application interface, a RESTful API.
Once you register your application, there is only one API function “Process Data”. It takes two parameters:
- handle to your user object inside the encryption service,
- data you want to process (authenticate, sign, tokenize, …).
Do you need legacy support? We have a PKCS11 library!
Special purpose processors protect your secrets. They connect directly to your cloud applications - there is nothing, no one in between. The HTTPS channel provides the second layer of encryption.
These secure processors are used by millions of users and applications. They have been designed to protect data in the most sensitive applications. They feature independent security evaluations (FIPS140-2 Level 3, EAL5+) providing ultimate physical security - your lock and key in the cloud.
Users of mobile or cloud applications
Apps using Enigma Bridge
End-to-end encryption to hardware CloudHSMs.
Secure internet connection
HTTPS to Enigma Bridge servers.
Enigma Bridge security domain
Network balancing, failover.
Enigma Bridge server
Work distribution, allocation of CloudHSMs.
Secure hardware element
Processing of client requests in CloudHSMs.
Enigma Bridge has extended the award winning research of Petr Svenda, our co-founder. He showed that all https keys leaked information about their origin.
“this is seriously awesome work” - Greg Linares, research engineer at Eeye Digital Security
This fact escaped experts for 30 years. It means that all companies are exposing a part of their security architecture and management processes online.
Encrypt and decrypt data and build security into your applications using our simple and secure encryption services.
Successful key management is the most difficult aspect of cryptography. But we’ve made it simple and secure, with physical storage of keys in our FIPS-140 Level 3 hardware.
PCI compliance, tokenization and cloud HSM made simple and cost effective.
Why buy and manage your own HSMs? It is a pain.
We enable businesses to move into the cloud whilst retaining the encryption keys in-house. Leaving them the ONLY entity able to decrypt their data, away from hackers and prying eyes!
Directly connected to with AWS.
The only reason that all web pages aren’t using secure HTTPS is because it is complex and costly to implement. We've changed that.
Tired of size restrictions for email attachments or needing to securly send documents? Check out this simple demo that leverages your Google Drive account.
IoT is great but disasterous without proper security.
One ring to rule them all...
Behind all the frenzy about Bitcoin lies a technology that is far bigger than the cryptocurrency itself. Its application of course relies on good encryption services.