Kindite's platform is based on a combination of strong, verifiable cryptography and multiple technological approaches in a way that enables contemporary end-to-end encryption.
our local module captures requests to and from the database and encrypts and decrypts as required while preventing from plain text and encryption keys to leave the endpoint.
Kindite's service will automatically deploy without any application code changes.
Kindite's unique Key generation and exchange algorithms allow an easy to use key management flow. Key rotation is done automatically and revocation can be done with a click of a button
The Key Orchestration subsystem stores only strongly-encrypted copies of data keys and has zero knowledge of how to decrypt them.