Discover Our Products.

Cosmian CipherCompute: Secure and Protect Collaborative Computation.

CipherCompute instances are deployed within each participant’s security perimeter (on premises or in the cloud) on servers close to the datasets. At each participant’s node, in decentralized mode, CipherCompute will activate the algorithm agreed by all participants. Participants’ data are never shared nor exposed in clear text, never leave the participant’s servers.

Benefits for Data Scientists – Create new, secured data in use capabilities.

  • Securely create synthetic datasets without sharing data in clear text.
  • Data owners are required to approve calculations – hence Data Owners control how their data are processed.
  • When a calculation is approved, if data are refreshed later, it only takes to relaunch the calculation to regenerate the synthetic datasets.
  • Data Owners’ data never move – hence neither the liability attached to the data (GDPR, data leak…)
  • Once CipherCompute up and running, it is easy to generate other sets with same security levels

Learn about the cryptographic technologies behind Cosmian CipherCompute

Secure Multi-Party Computation: Share computation without sharing data.

Secure Enclave: Protect your proprietary algorithms at execution.

What you & your team can do now with CipherCompute:

  • Engage in collaborative data processing over sensitive data between internal entities (business units, subsidiaries..), external entities (partners, suppliers…) and even competitors: respective data are never shared not exposed in clear text.
  • Augment & enrich data pooling by virtually create “bigger” data pits without moving data to centralized repositories.
  • Limit data scientists exposure to sensitive data – while allowing them to build & test data science models
  • Strongly lower your exposure to GDPR because you can now process sensitive data without exposing then in clear text.


Pathology scoring over combined data.

Financial Services: Data Science Modeling on sensitive identifiers from different internal datasources.

Financial Services:

How to process KPIs on fraudulent IBANs

Cybersecurity: Detection of suspicious cyber events between cyber teams of different companies/supply chain environment.

Cosmian ZeroTrust:
Secure your data & algorithms at rest and during computation

Take advantage of the cloud capabilities without compromising on security & privacy when moving your data & applications out of your local infrastructure. With ZeroTrust, data extracting & processing from the cloud is now secured – and ready for operational treatments.

Data and queries are encrypted and the cloud provider cannot decrypt the data not learn about the queries.

Managed Services can now operate on encrypted data – business continuity is ensured with enforced privacy & security via encryption.

Encryption-based Data Access Control to improve security in management & maintenance of access rights to data in the cloud.

Learn about the cryptographic technologies behind Cosmian ZeroTrust

Functional Encryption: Authorize computation on encrypted data and only reveal the results.

Secure Enclave: Protect data and algorithm at execution.

What you & your team can do now with ZeroTrust:

  • Improve security in management & maintenance of access rights to data in the cloud.
  • Advanced Data Encryption embeds “access control attributes” at the data level vs centralized software solutions usually prone to cyber attacks.
  • Perform statistics over confidential, sensitive identifiers without ever revealing the underlying IDs
  • Search encrypted text without accessing data in clear text

ZeroTrust Environment for Cloud Provider.

ZeroTrust Environment for Managed Services.

ZeroTrust Environment for internal IT Services.

ZeroTrust Environment for Data Lakes.

News, Articles, Resources.