

Founded in 2015
We encrypt all data in-transit and at-rest on mobile end-points, corporate servers, and cloud servers. Our technique only allows the user to generate encryption keys. Cloud and corporate systems administrators are masked from viewing your data.