Take control of your data.

tiCrypt is a browser based application used to to securely sharem store data, and deploy VMs to do secure computation and analysis —all while meeting compliance regulations for NIST 800-53, NIST 800-171, and certain CMMC levels.

Long-term project archival

In this blog we lay out a plan on how to support long-term project archival in tiCrypt.

Posted March 6, 2022 by Alin Dobra and Thomas Samant ‐ 5 min read

tiCrypt Secure Clusters

This document provides an introduction to secure clusters.

Posted March 2, 2022 by Samantha Dorfman ‐ 2 min read

Drive Types for VMs in tiCrypt

This blog gives an overview of the different types of drives and the rules for drive attachment within tiCrypt.

Posted March 1, 2022 by Samantha Dorfman and Thomas Samant ‐ 1 min read

tiCrypt Features

Public-key Crypto based

tiCrypt uses public-key cryptography as the fundamental mechanism to implement all security measures. Authentication is public-key digital signature based; encryption uses public-key encryption as well.

Data confinment through encryption

All resources in tiCrypt are end-to-end encrypted with independent keys controlled by the users (not admins). This ensures data is cryptographically confined and available to only authorized users.

Secure File storage and sharing

tiCrypt Vault provides a secure mechanism to store and share files among users and groups.

Secure Forms

tiCrypt provides a convenient mechanism to securely aquire external data from surveys or othe data soruces. The built-in survey designer or custom webpages can be used for data acquisition.

Secure Virtual Machines

Interactive Windows and Linux virtual machines can be easily started and managed by users. They allow unlimited flexibility in establishing complex data processing workflows.

Secure Batch Processing

The batch processing facility in tiCrypt allows full utilization of the computational resources. Any available CPU resources not used by the interactive VMs can be used asynchronously using un-coupled and coupled batch processing. Jobs from trivially paralelizable to complex MPI and Hadoop/Spark can be securely executed.

Project Management

tiCrypt allows access to files and virtual machines to be restricted at project level. When combined with security levels, requirements and user ceertifications, projects allow unifor enforcement of various compliance requirements.

Full history audit

tiCrypt maintains a full history log audit that is block-chained and can recover all the past actions in the system. Alerts are extracted in real-time from the log and forensic queries allow reconstruction of past events.

Flexible Reporting

tiCrypt provides a customizable reporting mechanism based on the audit trail that allows all the complinance and operational reporting needs to be met

Product Documentation

tiCrypt Connect

tiCrypt Connect is available for Mac, Windows and Linux. Its main purpose is to serurely deliver and automatically update tiCrypt front-end and to facilitate secure virtual machine connections and secure file transfers.


tiCrypt Front-end

tiCrypt Front-end is the main tiCrypt interface. It allows ...


tiCrypt Audit

tiCrypt Audit is the interface to the tiCrypt reporting, alerting and forensic tools.