Privacy-preserving analysis of confidential datasets.
- Collect encrypted data
Collect encrypted data from from web apps, devices, sensors, and databases. Data are encrypted on site and don't leave the device or organisation unencrypted.
- End-to-end security
Process encrypted data without removing the protection during any stage, from collection to result presentation.
- No insider attacks
Extract insights without having access to the data. Insider attacks are impossible if data is processed without decrypting it.
- Anonymity and precision
Process data anonymously without loss of precision. Data quality is ensured with privacy-preserving outlier removal and descriptive statistics.
Take data minimisation to the maximum with end-to-end encryption.
- Policy enforcement
Convince your customers that you can only process data according to their wishes. Even more - they can remotely attest and audit running systems.
“It's hard to convince companies to disclose data about their financial state. At the same time, everyone is interested in the health of the industry as a whole. Secure multiparty computation is considered trustworthy by members of the ITL.”
Technical overviewDownload Sharemind Technical Overview (.pdf)
Would you like to know more?
Contact our team:
Business Development (Privacy Preserving Technologies)firstname.lastname@example.org