Take Control of Your Data

In partnership with the Univerity of Florida, Tera Insights developed tiCrypt to meet the needs of secure research for ITAR, FISMA, and NIST projects. tiCrypt allows researchers to store, share, and analyze results securely in Vault storage or virtual machines. tiCrypt is actively deployed to secure research at national labs, leading medical centers, and top R1 universities.

hero-img
feature-image-shape
feature-image
feature-image-shape

No “pixie dust” promises of securing data

tiCrypt leverages strong symmetric and asymmetric cryptography to provide end-to-end encryption for secure file access, sharing, and processing.

Public-Key cryptography is the foundation on which all security features in tiCrypt are built.

Public key encryption is at the core of all security mechanisms that guard the internet.

  • Allows checking the authenticity of a website through SSL certificates.

  • Allows establishing a secure communication channel with the web server.

  • Allows digitally signing messages, allowing for meeting audit and regulation requirements.

tiCrypt Security Whitepaper

Developed for researchers by researchers

tiCrypt was developed with the idea that not every research project will have the same workflows and processes. Faculty, lab administrators, principal investigators, post-doc students, research computing staff, and university compliance officers at universities and medical centers gave thousands of hours of feedback while development was underway.

feature-image-shape
feature-image
feature-image-shape

Integrate tiCrypt with existing application workflows

Extend existing project workflows with well-known applications to tiCrypt's secure Virtual Machines.

feature-image-shape
feature-image
feature-image-shape

Have a look at how tiCrypt provides an easy-to-navigate web interface for researchers

slider-frame

Frequently asked questions about tiCrypt

tiCrypt is accessed through the tiCrypt Connect application. This lightweight executable opens tiCrypt in the user's browser and establishes a secure connection to the system. The application is available for Windows, macOS, and Linux.
tiCrypt can be deployed on a combination of existing on-premise hardware, cloud bare-metal solutions, and hyper-converged infrastructure.
tiCrypt utilizes a deployment subscription model that allows unlimited use of the system and seats. Deployment pricing is based on CPU/vCPU numbers.

Take Control of
Your Data

What Universities are saying about tiCrypt

Articles, Case Studies, and Papers

UMD/ARLIS Grant Expenditure Case Study
person-thumb

University Deployment

Case Study

Citadel Deployment at Princeton
person-thumb

University Deployment

Article

UMD Press Release
person-thumb

University Deployment

Article