Transparent Data-at-Rest
Encryption

Plug & Play Proxy Container

Making end-to-end encryption convenient, safe and inexpensive

What

Databases

View more
  • MySQL live
  • Cockroach DB beta
  • Postgres beta
  • MS SQL TBD
  • Oracle TBD
Technical Details

Object Storage

View more
  • S3 TBD

File Storage

View more
  • Google Drive TBD
  • Dropbox TBD
  • OneDrive TBD
How

Plug and Play, No-Code

No changes needed to your code or software, just switch the DB credentials in your client application and use the setup guide to walk you through the encryption settings.

Column Level Encryption

Easily select only critical DB columns for encryption to maintain visibility for real-time DB monitoring and mining of unencrypted columns.

Bulk Update

Admin control for encrypting or decrypting all pre-existing entries within selected columns, without disrupting normal DB operations.

No DB Downtime

Conduct full deployment and all ongoing VESencrypt operations while DB remains fully operational — VESencrypt can operate with encrypted and unencrypted data in the same column simultaneously.

Flexible Deployment

Choose between deploying an end-to-end Docker container on your host or using a convenient zero-setup Hosted Proxy. Easily transition between the two at any time.

Realtime Access Control

Get an instant alert on your device when a new proxy attempts to connect, approve or deny through a secure web console.

Why

Hosted data-at-rest encryption is vulnerable

View more

VESencrypt solves the API vulnerability and more

View more

VESencrypt is backed by patented VES technology

View more