Skip to main content
Developed by Tera Insights in collaboration with the University of Florida
NIST 800-171 Certified·CMMC 2.0 Level 2 Certified·FIPS 140-3 Compliant

Take Control of Your Data

A secure enclave for storing, sharing, and analyzing restricted data inside isolated VMs or submitting batch jobs via native SLURM integration.

Read Whitepaper
0+Researchers
0+Unique Research Projects
0M+Grant Funding

The tiCrypt Platform

Your Data Is Restricted. Your Research Shouldn't Be.

Encrypted storage, secure virtual machines, and CMMC/NIST compliant batch processing in a single platform.

User-Centric PKI

Every user holds their own RSA-2048 key pair. All drives, files, and data are end-to-end encrypted with AES-256. Administrators cannot access user data unless explicitly shared.

  • RSA-2048 key pairs generated at registration, the private key never leaves the user
  • All authentication based on digital signatures, not stored credentials
  • AES-256 encryption managed through PKI for every file and drive
  • Without the decryption key, stored data is useless, even to administrators
83719046254062581937591736082415937048262608419375735914806204826371596284073591Generating key...

Our Origin

Developed for Researchers, by Researchers

Built in collaboration with the University of Florida. Thousands of hours of feedback from faculty, principal investigators, post-docs, research computing staff, and compliance officers shaped the platform.

1000sHours of researcher and system administrator feedback
8+Full scale R1 deployments and counting
0Compromises on data security

110 Controls. 84 Directly Addressed with tiCrypt.

tiCrypt directly addresses 84 of the 110 NIST SP 800-171r2 practices required for CMMC Level 2 certification. The remaining 26 cover organizational policies, physical security, and personnel processes — areas that require institution-specific implementation.

84DirectlyAddressed
ACAccess Control17 / 22
ATAwareness & Training0 / 3
AUAudit & Accountability9 / 9
CMConfiguration Management7 / 9
IAIdentification & Auth11 / 11
IRIncident Response1 / 3
MAMaintenance2 / 6
MPMedia Protection9 / 9
PSPersonnel Security0 / 2
PEPhysical Protection0 / 6
RARisk Assessment2 / 3
CASecurity Assessment3 / 4
SCSystem & Comms Protection16 / 16
SISystem & Info Integrity7 / 7

Who Uses tiCrypt

Built for the Most Demanding Research Environments

From research universities to defense contractors and national labs, tiCrypt is the trusted secure enclave for institutions that cannot afford to compromise.

Research Universities

CMMC-Ready CUI Environment.

Satisfies data handling requirements for DoD (DFARS 252.204-7012), NSF, NIH, and DHS without additional infrastructure. Maps to NIST SP 800-171 controls.

  • DoD-funded research (DFARS / CUI)
  • NIH and NSF sensitive data compliance
  • Multi-PI collaboration with data isolation
  • NIST SP 800-171 control mapping
Defense Contractors & FFRDCs

ITAR-Compatible. Audit-Ready.

All actions are logged to tiAudit, a separate system with independent authentication. Audit records are immutable from installation date onward. Project-level isolation enforces ITAR/EAR access boundaries.

  • Immutable audit trail for contract reporting
  • Every action is audited, no exceptions
  • Per-project access control and data isolation
  • Separate audit system with independent login
HPC & Computational Research

Secure HPC With Minimal Overhead.

SLURM-managed clusters inside a certified enclave. Hardware-accelerated encryption adds single-digit percentage overhead on I/O, negligible for compute-bound workloads.

  • SLURM job submission inside the enclave
  • Encrypted scratch storage for batch jobs
  • VM-based interactive compute sessions
  • Secure data ingestion via write-only SFTP

What Experts Are Saying

Independently Validated Security

"

Our independent security review and penetration test of tiCrypt revealed an exceptionally strong, defense-in-depth architecture aligned with NIST SP 800-171. The platform incorporates non-default security design choices not commonly encountered in comparable systems. We were particularly impressed by the overall security architecture and the team's responsiveness.

Guillermo Munoz, M.A., CISSP, CEHSenior Information Security ArchitectHarvard Medical School
"

We have been working with Tera Insights for about a decade on building a computing environment for working with restricted data that is flexible, highly secure, and straightforward to manage. With constant feedback from researchers, the environment has matured to meet the demands of very complex workflows.

Dr. Erik Deumens, PhDSenior Director, UFIT Research ComputingUniversity of Florida
"

After completing our penetration test of the tiCrypt LASER environment, we came away genuinely impressed. The platform reflects a layered, thoughtful security architecture built with compliance and protection at its core. For organizations working with sensitive data, tiCrypt is an exemplary model.

Amanpreet Parmar, CASP+Senior Security EngineerHarvard Medical School
"

Our tiCrypt environment has significantly improved collaboration between the college and hospital by providing researchers from both organizations a shared space to work with highly sensitive data. We have enjoyed watching the platform mature and continually improve. As we find new use cases, Tera Insights has been great to help us find solutions.

Elijah Gagne, M.S.Director Research CyberinfrastructureDartmouth
"

Our independent security review and penetration test of tiCrypt revealed an exceptionally strong, defense-in-depth architecture aligned with NIST SP 800-171. The platform incorporates non-default security design choices not commonly encountered in comparable systems. We were particularly impressed by the overall security architecture and the team's responsiveness.

Guillermo Munoz, M.A., CISSP, CEHSenior Information Security ArchitectHarvard Medical School
"

We have been working with Tera Insights for about a decade on building a computing environment for working with restricted data that is flexible, highly secure, and straightforward to manage. With constant feedback from researchers, the environment has matured to meet the demands of very complex workflows.

Dr. Erik Deumens, PhDSenior Director, UFIT Research ComputingUniversity of Florida
"

After completing our penetration test of the tiCrypt LASER environment, we came away genuinely impressed. The platform reflects a layered, thoughtful security architecture built with compliance and protection at its core. For organizations working with sensitive data, tiCrypt is an exemplary model.

Amanpreet Parmar, CASP+Senior Security EngineerHarvard Medical School
"

Our tiCrypt environment has significantly improved collaboration between the college and hospital by providing researchers from both organizations a shared space to work with highly sensitive data. We have enjoyed watching the platform mature and continually improve. As we find new use cases, Tera Insights has been great to help us find solutions.

Elijah Gagne, M.S.Director Research CyberinfrastructureDartmouth

Take Control of Your Data

Join the growing community of universities, national labs, and medical centers using tiCrypt to protect sensitive data, meet compliance requirements, and empower researchers to do their best work.