CryptoMill Technologies

CryptoMill Technologies

Data security solutions for enterprises.

  • Edit
Get premium to view all results
DateInvestorsAmountRound
-investor

€0.0

round

N/A

Late VC
Total Funding000k
Notes (0)
More about CryptoMill Technologies
Made with AI
Edit

CryptoMill Technologies is a Canadian cybersecurity firm that provides data-centric security solutions to governments and businesses. Founded in 2005 by Nandini Jolly, the company operates on the principle of making security both usable and simple. Jolly, who serves as President and CEO, has a background in international finance and risk management, with prior roles at the Bank of America and Deloitte. Her experience in financial risk management informed her vision for creating security solutions that address both external and internal data threats.

The company's business model centers on developing and selling proprietary data security software. CryptoMill targets a range of clients, from large enterprises to government bodies, including a notable partnership with Canada's national defense department. A significant milestone was an agreement with HP to bundle a CryptoMill encryption program with 40 million of their devices. The company's core market is organizations in sectors like finance, government, and others that handle sensitive information and require robust data protection to comply with regulations and mitigate breach risks.

CryptoMill’s product suite is built on a zero-trust, data-centric architecture, ensuring that data remains protected at rest, in use, and in motion. The flagship offering, Circles of Trust™ (CoT), is a software suite that provides persistent, file-level encryption, meaning the protection travels with the data wherever it goes. This allows organizations to create secure, trusted boundaries for data sharing, both internally and with external partners. Other products include SEAhawk for full-disk encryption on devices, CODA for secure collaboration in a web-based environment, and Vanishh for consumer-focused email encryption. A key feature across the platform is the use of government-grade AES-256 encryption and patented cryptographic control technology, with controls that allow for dynamic revocation of access even after data has been downloaded.

Keywords: data-centric security, zero-trust architecture, persistent encryption, file-level encryption, Nandini Jolly, cryptographic control, access control, secure collaboration, data loss prevention, cybersecurity solutions, information protection, government security, enterprise data security, Canadian technology, data-at-rest protection, data-in-motion protection, full-disk encryption, secure file sharing, Circles of Trust, regulatory compliance

Analytics
Unlock the full power of analytics with a premium account
Track company size and historic growth
Track team composition and strength
Track website visits and app downloads

Tech stack

Group
Tech stackLearn more about the technologies and tools that this company uses.
Book a Demo