tiCrypt Features

Executive-level overview · 4 minute read

tiCrypt Features Overview

tiCrypt Features Overview

tiCrypt provides a broad set of features supporting a wide range of secure data-processing use cases. This section highlights core features most relevant to first-time users, with examples commonly used by U.S. and Canadian defense contractors.

tiCrypt Front-End Components

The tiCrypt front end consists of three primary components:

  • Vault
  • Virtual Machines
  • Management

Vault

The Vault functions similarly to a cloud file system (e.g., Google Drive), but is end-to-end encrypted. It stores files and directories uploaded from a user’s local machine and ensures data remains protected at rest and in transit.

✔️End-to-end encrypted file storage

Sharing

Users can securely share files or directories with other users. Sharing can be:

  • Time-bound
  • Restricted to viewing, downloading, or editing

Data can also be imported into the Vault via:

  • Dropbox, Google Drive, OneDrive, and Box
  • SFTP for large-data transfers
✔️Secure sharing and data import

Inboxes

Inboxes provide the simplest way to receive data from external individuals or organizations that are not part of the tiCrypt environment.

  • Each inbox generates a secure upload link
  • Uploaders use a browser or SFTP (for large transfers)
  • Uploaded data lands directly into the user’s Vault
✔️Secure external data ingress without onboarding external users

Groups

Groups allow multiple users to collaborate securely.

  • Groups are cryptographically encrypted user assemblies
  • Each group has a shared folder
  • Data shared within a group is accessible only to group members
✔️End-to-end encrypted groups

Projects

Projects restrict access to sensitive files and directories.

  • Files and folders can be tagged to a project
  • Only project members may access tagged content
  • Projects can enforce security requirements

Security requirements are bundled into security levels. Only users who satisfy all requirements of a security level can access the data.

Project owners can optionally restrict:

  • Viewing
  • Editing
  • Downloading
✔️Access-controlled projects

Virtual Machines

Virtual machines (VMs) are secure, isolated desktop environments running entirely within tiCrypt’s controlled infrastructure.

Within a virtual machine, users can:

  • Run applications and tools
  • Process sensitive datasets
  • Edit documents, code, spreadsheets, and presentations
  • Browse the web in a monitored and restricted environment

By isolating computation from user endpoints, virtual machines significantly reduce the risk of data leakage.

✔️Secure compute without exposing sensitive data to endpoints

Cluster VMs

For large-scale or compute-intensive workloads, tiCrypt supports clustered virtual machines:

  • Multiple virtual machines can be interconnected
  • Multiple users can collaborate on shared compute resources
  • Compute, memory, and storage can be pooled to handle complex tasks
✔️High-performance clusters for large-scale and data-intensive projects

Terminals

Virtual machines provide flexible terminal access, including:

  • Direct command-line access
  • Multiple concurrent terminal sessions
  • Parallel workflows across multiple virtual machines
✔️Multi-terminal access for advanced and parallel workflows

Transfers

Virtual machines are designed to securely handle data movement:

  • Encrypted local drives protect data at rest
  • Seamless transfers to and from the Vault
  • Vault mirroring ensures encryption during transit and storage

Virtual machines also support direct SFTP transfers from:

  • External servers
  • Local machines

This enables efficient ingestion and processing of large datasets without compromising security.

✔️Encrypted, high-throughput data transfers

Restricted Virtual Machines

Virtual machines containing sensitive data can be explicitly bound to projects.

  • Only authorized project members may access the VM
  • Access is enforced consistently with project-level security controls
✔️Access-controlled virtual machines with encrypted storage

Management

tiCrypt provides a comprehensive management layer designed to support secure administration at scale.

Teams

All users and administrators operate within teams.

  • Teams are access-controlled
  • Teams are managed by administrators
✔️Organized user infrastructure

Managed Objects

Administrators can delegate operational responsibility by assigning:

  • Teams
  • Groups

to sub-administrators, enabling controlled and scalable delegation.

✔️Delegated management at scale

Profiles

Administrators assign profiles to users to define permissions and system access.

Profiles determine:

  • Which features users can access
  • Which system components are available (Vault, Virtual Machines, Management, and others)
✔️Permissions aligned with NIST 800-171 control families

Projects (Admin View)

Administrators manage project-level security and access restrictions.

  • Users may require certifications to meet project security requirements
  • Projects enforce access rules consistently across files, groups, and virtual machines
✔️Controlled project administration

Certifications

Administrators can issue certifications to users.

  • Certifications act as verifiable proof that users meet specific requirements
  • When required certifications are met, users gain access to project data

Notes:

  • Projects are access-controlled
  • Groups are cryptographically enforced
  • Both mechanisms can be combined
✔️Verified compliance through certifications

Scaling Techniques

tiCrypt supports multiple scaling strategies:

  • Multiple groups under a single project tag, enabling isolated collaboration
  • Large groups with directories tagged to different projects for parallel, independent workflows
✔️Dynamic group–project orchestration

Subprojects

Subprojects enable hierarchical organization within projects.

Example:

  • A parent project represents the main component
  • Subprojects represent individual subcomponents

This structure supports complex, multi-stage workflows.

✔️Deep project architecture

Virtual Machine Administration

tiCrypt’s virtual machine infrastructure is composed of layered components, including:

  • Realms
  • Hosts
  • Pools
  • Servers
  • Volumes
  • Profiles
  • Hardware configurations
  • Images, drives, and VM definitions

These layers integrate with the backend to deliver secure and flexible compute environments.

✔️Backend-coordinated VM administration

Settings

Organizations can customize:

  • Branding and themes
  • Email templates
  • CUI banners
  • Terms of service
  • Custom metadata fields
✔️Organization-tailored environment

Auditing

Auditing is implemented as a dedicated, permanent subsystem.

It provides:

  • Alerts across all system layers
  • Prebuilt compliance reports
  • SQL-based query access to event logs
  • A complete, immutable audit trail
✔️Built-in audit-compliant system