Zero-Knowledge Encryption
AES-256-GCM with envelope encryption. Data Encryption Keys never stored in plaintext. Bring your own KMS, or use our managed HSM with FIPS 140-2 Level 3 hardware.
Enterprise-grade cross-domain gateway with policy-driven authorization, AES-256-GCM encryption, and zero-trust architecture. Purpose-built for organizations where data sovereignty is non-negotiable.
Trusted by organizations in
Capabilities
Every control below exists because a real customer, in a regulated industry, asked for it. Nothing is optional theatre.
AES-256-GCM with envelope encryption. Data Encryption Keys never stored in plaintext. Bring your own KMS, or use our managed HSM with FIPS 140-2 Level 3 hardware.
Downloads aren't just "allowed." A multi-rule policy engine evaluates file integrity, AV verdict, drop status, expiry, and scanner health before every release.
Every file scanned by ClamAV with signature freshness tracking. The system fails closed on scanner unavailability — no bypasses, no exceptions, no exception approvals.
Every action logged: uploads, downloads, scans, policy decisions, admin activity. Full chain of custody for compliance, incident response, and forensic reconstruction.
Enterprise IdP integration via SAML 2.0. Role-based access with Admin, Operator, and Auditor roles. No local passwords — the attack surface simply doesn't exist.
External senders upload via a single tokenized link. No accounts, no passwords, no friction. The management plane is fully hardened and isolated from the public surface.
Architecture
Data moves through the gateway along one deterministic path — scanned, encrypted, policy-checked, and finally released to an authorized recipient. No side channels. No exceptions.
AES-256-GCM at rest with per-object DEKs. TLS 1.3 in transit with modern cipher suites only.
All access URLs use hashed, single-use tokens with bounded lifetime and recipient binding.
Public upload surface is fully isolated from the management plane. No shared trust, no shared routes.
Compliance
Cryptic Gateway deploys into environments with the most demanding regulatory and certification regimes in the world.
Compliance posture varies by deployment configuration. Contact us for a mapping against your specific authority-to-operate requirements.
Pricing
Annual subscription with multi-year discounts. Sovereign deployments are quoted to scope.
For departmental deployments.
Billed annually
Request quoteFor organization-wide deployment.
Billed annually
Request quoteFor classified and high-assurance environments.
Scoped to accreditation requirements.
Contact for quoteContact
Tell us where you're deploying. We'll schedule a technical walkthrough with a solutions architect.
Typically responds within 1 business day. Demos available under NDA.