Privacy-preserving analysis of confidential datasets.
Our offering
- Collect encrypted data
Collect encrypted data from from web apps, devices, sensors, and databases. Data are encrypted on site and don't leave the device or organisation unencrypted.
- End-to-end security
Process encrypted data without removing the protection during any stage, from collection to result presentation.
- No insider attacks
Extract insights without having access to the data. Insider attacks are impossible if data is processed without decrypting it.
- Anonymity and precision
Process data anonymously without loss of precision. Data quality is ensured with privacy-preserving outlier removal and descriptive statistics.
- Compliance
Take data minimisation to the maximum with end-to-end encryption.
- Policy enforcement
Convince your customers that you can only process data according to their wishes. Even more - they can remotely attest and audit running systems.
“It's hard to convince companies to disclose data about their financial state. At the same time, everyone is interested in the health of the industry as a whole. Secure multiparty computation is considered trustworthy by members of the ITL.”
Did we spark your interest?
Additional reading
Additional documents
Technical overview
Download Sharemind Technical Overview (.pdf)Sharemind HI for Web Services - White Paper
Download for_web_services_white_paper_3d2bc33175.pdf (.pdf)Would you like to know more?
Contact our privacy technologies team: