With just a few lines of code, software teams can do the same things they do with regular data, at real-time speeds — only everything is always encrypted.
Use Blind Insight's API-driven architecture to connect and integrate into your existing systems with ease. Get going quickly with our hosted solution, or get in touch for more info about Enterprise and on-prem deployments.
async recordsSearch(schemaId, label, value, limit, offset) {
const options = {
method: "POST",
body: JSON.stringify({
schema: schemaId,
label,
value,
limit,
offset
}),
}
}
async recordsDecrypt(records) {
if (!records || !records.length) return []
const options = {"method": "POST", "body": JSON.stringify(records)}
return await this.call("/api/records/decrypt/", options)
}
Pluggable with virtually any database format or system architecture. Deploy on-prem, on the edge, or in public or private cloud environments.
Encrypt your data locally, and send it to Blind Insight. Use our hosted APIs for processing.
Keep your data local and run Blind Insight locally.
Keep your data local and use our hosted APIs.
Work with encrypted data the same way you do unencrypted data.
Endpoints for insert, update, delete, and query operations, user and organization management.
Currently available for Python with support for more languages coming soon. Get in touch to request one.
async recordsSearch(schemaId, label, value, limit, offset) {
const options = {
method: "POST",
body: JSON.stringify({
schema: schemaId,
label,
value,
limit,
offset
}),
}
}
async recordsDecrypt(records) {
if (!records || !records.length) return []
const options = {"method": "POST", "body": JSON.stringify(records)}
return await this.call("/api/records/decrypt/", options)
}
Use the Blind Proxy™ to encrypt and decrypt in your own environment or use our managed secure enclave-based proxy service for a purely API-driven approach, with nothing to install.
Column or field-level permissions to analyze encrypted data, receive, and selectively decrypt encrypted results.
The Blind Proxy encrypts data before it enters the query environment, and we don't hold any keys.