Award-winning Data Security Platform
Select the building blocks you need to suit your architecture. Built-in or bolt-on. Cloud, Prem, or Hybrid. Modern or Legacy. Your systems, your schema. Your data. Fully encrypted and fully usable at the same time. Does not break applications.


Titaniam Vault
- Store and analyze petabytes of data without decryption
- Full featured search and analytics
- Release data in nine secure and private formats
- Pre-integrated with API, Proxy and Plugin, and Studio
- Integrates with ransomware proof backup and recovery and DRM for document release
- FIPS 140-2 data-in-use encryption for structured and unstructured data

Titaniam API
- Stands alone or integrates into Vault, Proxy, Plugin, or Studio
- High performance data translation service
- Supports nine secure and private formats including searchable encryption
- Supports all types of data including keywords, text, numbers, dates, IP Addresses, Binary and PII specific data types
- FIPS 140-2 encryption

Titaniam Proxy
- Supports full featured search on encrypted data
- Supports privacy enabled data release in nine secure and private formats
- Bolts on to non-extensible, legacy, or otherwise fragile systems
- Transparently directs sensitive data in and out according to security or privacy policy
- Pre-integrates to Vault to swap sensitive data for tokens
- Pre-integrates with API, Plugin, and Studio
- FIPS 140-2 encryption for data-in-use

Titaniam Plugin
- Currently available for all versions of Elasticsearch, OpenDIstro, and Opensearch, on AWS, GCP, and Azure
- Supports full featured search on encrypted data without decryption
- All data in index and search results is always encrypted even in memory
- Search includes term, prefix, suffix, range, wildcard, CIDR
- Supports privacy enabled data release
- Supports index, document, and field level keys, BYOK, and Valet features
- Pre-integrates with API and Proxy
- FIPS 140-2 encryption for data-in-use

Titaniam Studio
Configure and manage Titaniam modules and services. View logs, dashboards, and reports.


Keys
FIPS 140-2 certified key management, key rotation, re-keying

BYOK/Valet
Customer owned keys for data-in-use, key revocation and restricted valet keys

Schemas
Manage data context through schemas for encrypted data portability

Dashboards
Monitor sensitive data usage through logs, dashboards and reports