Take Control of Your Data
tiCrypt gives universities, research institutions, and federal contractors a turnkey secure computing environment — with end-to-end encrypted VMs, SLURM cluster integration, and compliance built in from day one.
Compliance & Certifications
Platform Capabilities
Everything You Need in a Secure Enclave
tiCrypt combines cryptographic security, compliance certifications, and research-grade compute — in one unified platform.

End-to-End Encryption
Every user, file, and resource is protected by unique RSA-2048 public-private key pairs. Cryptographic control stays with the data owner — always.

User-Owned Security
Administrators cannot access user data. Each researcher holds their own keys, fully owning and controlling their secure workspace.

Standalone Secure VMs
Deploy fully isolated virtual machines with encrypted drives, locked-down networking, and fully audited access.

SLURM Integration
Submit HPC jobs to SLURM-managed clusters directly from within the enclave — combining enclave-grade security with high-performance computing.

Compliance by Design
CMMC 2.0 Level 2 Certified, NIST 800-171 Certified, and FIPS 140-3 Compliant — compliance is the foundation of tiCrypt, not an afterthought.

Multi-Institution Management
Manage users, projects, and data across departments and institutions with role-based access, sub-admin delegation, and full audit trails.
Virtual Machines & HPC
Isolated VMs and SLURM — Together
tiCrypt integrates directly with SLURM, letting researchers submit jobs from within secure virtual machines — delivering the familiar on-demand HPC experience without moving sensitive data outside the enclave.
- Standalone VMs on Libvirt (KVM/QEMU) or bare metal
- SLURM job submission from within the enclave
- Encrypted drives per VM with LUKS (Linux) or BitLocker (Windows)
- Full VM session audit trail — every action logged

Compliance & Certification
CMMC 2.0 Level 2 Certified. NIST 800-171 Certified.
tiCrypt is purpose-built for researchers handling Controlled Unclassified Information (CUI), federal grant data, and ITAR-regulated research. With CMMC 2.0 Level 2 certification, NIST 800-171 certification, and FIPS 140-3 compliant cryptography, it provides the compliance posture institutions need to win and retain federal funding.
- CMMC 2.0 Level 2 Certified
- NIST 800-171 Certified
- FIPS 140-3 Compliant Cryptography
- Role-based access control with escrow key recovery
- Comprehensive audit logging for compliance reporting

Security Architecture
Zero-Trust, User-Owned Data Model
Unlike cloud platforms where the provider holds the keys, tiCrypt implements a zero-trust, user-owned security model. Each user holds their own RSA-2048 key pair — administrators cannot read user data, by design.
This architecture is a requirement across federal compliance frameworks. tiCrypt makes it the default, not a configuration option.
- Individual RSA-2048 public-private key pairs per user
- Administrators cannot access user data — by design
- Key escrow with multi-party approval for authorized recovery
- End-to-end encrypted file vault
- Private key never transmitted over the network

Who Uses tiCrypt
Built for the Most Demanding Research Environments
From research universities to defense contractors and national labs, tiCrypt is the trusted secure enclave for institutions that cannot afford to compromise.
Win Federal Grants. Keep CUI Secure.
Provide researchers with a CMMC-ready environment that satisfies DoD, NSF, NIH, and DHS data handling requirements — out of the box.
- DoD-funded research (DFARS / CUI)
- NIH and NSF sensitive data compliance
- Multi-PI collaboration with data isolation
- Institutional compliance reporting
ITAR-Compatible. Audit-Ready.
Meet the security posture required for ITAR-regulated projects, classified-adjacent research, and federal contract compliance.
- Full audit trail for contract reporting
- No notion of non-audited actions within the environment
- Umbrella compliance via project isolation
Secure HPC Without Compromise.
Combine the power of SLURM-managed clusters with the security guarantees of a certified enclave — no tradeoffs between speed and compliance.
- SLURM job submission inside the enclave
- Encrypted scratch storage for batch jobs
- VM-based interactive compute sessions
- Secure data ingestion via write-only SFTP
Ready to Secure Your Research?
Join the growing community of universities and research institutions using tiCrypt to protect sensitive data, meet compliance requirements, and empower researchers to do their best work.