tiCrypt – A NIST 800-171/CMMC Level 2 Compliant VDI Solution
For US & Canadian Defense Contractors.
tiCrypt is a product of Tera Insights and the University of Florida Research Computing. It is a single, fully integrated platform for secure data processing designed to exceed NIST 800-171/CMMC Level 2 requirements.
tiCrypt Screenshots

tiCrypt Vault
Why tiCrypt?
tiCrypt Security
tiCrypt establishes a secure, encrypted communication channel between users and compute resources, providing VPN- and firewall-like protections without requiring separate networking or security software.
tiCrypt implements a zero-trust, end-to-end encryption model in which all data is encrypted using strong cryptography and can be decrypted only by authorized users holding private keys.
Encryption is enforced consistently, does not rely on passwords, and prevents servers or administrators from accessing data - even in the event of a server breach.
tiCrypt Components
tiCrypt runs on-prem and consists of:
- tiCrypt Connect, a lightweight front-end that runs on the user’s computer (Windows, macOS, Linux)
- A set of back-end services running on a Red Hat Enterprise Linux server
- Virtual machine (VM) controllers that manage secure environments
- Customer-provided compute resources, including CPU, memory, and storage, used for secure workflows
Built to Scale
tiCrypt is hardware agnostic, highly scalable, and operates without additional software dependencies, enabling rapid deployment within weeks.
Proven Compliance Track Record
tiCrypt has a strong and established compliance history: 100% of customers have passed external NIST 800-171 and CMMC Level 2 audits, with successful assessments dating back to 2017.
Value for Money
Pricing is transparent and predictable, with licensing and support provided under a single annual agreement that delivers strong value.
In-House VDI Solutions
Organizations can attempt to build a compliant VDI solution in-house. A range of technologies exist that address virtualization, such as VMware, KVM, Nutanix, Microsoft Hyper-V, and OpenStack.
These platforms provide the infrastructure layer for running virtual machines and are a necessary building block for an in-house VDI environment. However, they do not, on their own, deliver end-user access or a secure, compliance-ready workspace.
Complex Integrations
To make such environments usable, organizations must add technologies such as Citrix or VMware Horizon as well as additional components that are required for user access control, data protection and encryption, auditing and logging, and policy enforcement.
- ⚠️The more integrations, the more dependencies and complexity
Vulnerabilities
Traditional in-house solutions typically rely on partial or centrally managed encryption, often tied to passwords or administrative access. As a result, administrators or compromised backend systems may be able to decrypt sensitive data, increasing the attack surface and risk of exposure.
- ⚠️ Increasing risk of data exposure and admin access
Unpredictable Costs
In practice, in-house VDI solutions involve multiple vendors and tightly coupled integrations, increasing operational complexity and placing the full burden of integration, ongoing maintenance, and audit readiness on the organization.
- ⚠️Unpredictable escalating costs and maintenance
Why Not tiCrypt?
tiCrypt replaces this multi-vendor stack with a single, integrated solution purpose-built for secure, compliance-ready data processing - reducing deployment time, operational complexity, compliance risk, and overall cost.
tiCrypt vs Traditional In-House Solutions
A side-by-side comparison highlighting operational, security, and compliance differences.
| Element | tiCrypt | In-House Solutions |
|---|---|---|
| Security architecture | ✔️ Integrated | ❌ Multi-layer |
| Dependence on multiple vendors | ✔️ No | ❌ Yes |
| Integration & maintenance costs | ✔️ None or minimal | ❌ High |
| Compliance costs (internal / consultants) | ✔️ Low | ❌ Substantial |
| External security assessment | ✔️ Proven record | ❌ Uncertain |
| Time to deploy | ✔️ Weeks | ❌ Months |
| Total cost of ownership | ✔️ Predictable | ❌ Unpredictable |
Learn More
Explore our resources to better understand tiCrypt.