Process sensitive data with state-of-the-art privacy, security and compliance.
Secure a sensitive business process in weeks.
Directly use advanced cryptographic functionalities via standard software.
Protect data at-rest and in-use by default.
Studies by the United Nations and European Commission say: "MPC is a state-of the-art privacy preserving tool", because after the initial encryption step, data is always protected and "considered to be non-personal data".
The Cranmera privacy engine processes data while encrypted.
Encrypted data is sent to separate servers, which perform computations together.
Hence, the key requirement for security is separation of duties *, a time-tested control.
Theory of Secure Multi-Party Computation (MPC) became mainstream due to advances in networking, compute and protocol theory.
TUE and CWI, our alma maters, are known for their work in 'semi-honest' and 'active security' MPC protocols.
Develop a solution that: A. efficiently combines similar transactions across different banks and B. then detects money laundering on the combined transactions, with superior privacy and data protection.
Assess and report on gender equality in workforces of participating organizations -with superior privacy -enabling our client to support government audits and voluntary readiness assessments with organizations.
Enable a CERT to survey a network of organizations: “Have you seen this threat?” Organizations then anonymously upload their response. CERT shares the aggregated result back to the network.
Secure Computation engine that directly enables many common functionalities: Benchmarks, Surveys, Operations Research, Pattern Matching, Machine Learning.
De-identification pipeline that prevents tracking personal/confidential data back to its origins.
First, we define analytical and privacy requirements together. We are available to your stakeholders (business, legal, compliance, technology).
Then, we tailor and license the software to you.
Our source code is available to you for inspection. (We retain intellectual property.)
We partner with your IT team or integrator to ensure successful deployment, integration support and run performance.
First large-scale use of secure computation by Danisco and association of Danish beet growers. Reduction in EU subsidies drove immediate need to trade production rights.
Boston Women’s Workforce Council commissioned two studies of wage disparities within organizations in the Great Boston Area (2015-2016).