tiCrypt – A NIST 800-171/CMMC Level 2 Compliant VDI Solution

For US & Canadian Defense Contractors.

tiCrypt is a product of Tera Insights and the University of Florida Research Computing. It is a single, fully integrated platform for secure data processing designed to exceed NIST 800-171/CMMC Level 2 requirements.

✔️NIST 800-171 Compliant
✔️CMMC Level 2 Compliant
Tera Insights LogoUF Logo

tiCrypt Screenshots

tiCrypt Vault

tiCrypt Vault

Why tiCrypt?

tiCrypt Security

tiCrypt establishes a secure, encrypted communication channel between users and compute resources, providing VPN- and firewall-like protections without requiring separate networking or security software.

tiCrypt implements a zero-trust, end-to-end encryption model in which all data is encrypted using strong cryptography and can be decrypted only by authorized users holding private keys.

Encryption is enforced consistently, does not rely on passwords, and prevents servers or administrators from accessing data - even in the event of a server breach.

Data and communications are end-to-end encrypted

tiCrypt Components

tiCrypt runs on-prem and consists of:

  • tiCrypt Connect, a lightweight front-end that runs on the user’s computer (Windows, macOS, Linux)
  • A set of back-end services running on a Red Hat Enterprise Linux server
  • Virtual machine (VM) controllers that manage secure environments
  • Customer-provided compute resources, including CPU, memory, and storage, used for secure workflows
No external software dependencies

Built to Scale

tiCrypt is hardware agnostic, highly scalable, and operates without additional software dependencies, enabling rapid deployment within weeks.

Hardware agnostic, at any scale
Fast deployment

Proven Compliance Track Record

tiCrypt has a strong and established compliance history: 100% of customers have passed external NIST 800-171 and CMMC Level 2 audits, with successful assessments dating back to 2017.

Proven compliance track record

Value for Money

Pricing is transparent and predictable, with licensing and support provided under a single annual agreement that delivers strong value.

Predictable cost, value for money

In-House VDI Solutions

Organizations can attempt to build a compliant VDI solution in-house. A range of technologies exist that address virtualization, such as VMware, KVM, Nutanix, Microsoft Hyper-V, and OpenStack.

These platforms provide the infrastructure layer for running virtual machines and are a necessary building block for an in-house VDI environment. However, they do not, on their own, deliver end-user access or a secure, compliance-ready workspace.

Complex Integrations

To make such environments usable, organizations must add technologies such as Citrix or VMware Horizon as well as additional components that are required for user access control, data protection and encryption, auditing and logging, and policy enforcement.

  • ⚠️The more integrations, the more dependencies and complexity

Vulnerabilities

Traditional in-house solutions typically rely on partial or centrally managed encryption, often tied to passwords or administrative access. As a result, administrators or compromised backend systems may be able to decrypt sensitive data, increasing the attack surface and risk of exposure.

  • ⚠️ Increasing risk of data exposure and admin access

Unpredictable Costs

In practice, in-house VDI solutions involve multiple vendors and tightly coupled integrations, increasing operational complexity and placing the full burden of integration, ongoing maintenance, and audit readiness on the organization.

  • ⚠️Unpredictable escalating costs and maintenance

Why Not tiCrypt?

tiCrypt replaces this multi-vendor stack with a single, integrated solution purpose-built for secure, compliance-ready data processing - reducing deployment time, operational complexity, compliance risk, and overall cost.

tiCrypt vs Traditional In-House Solutions

A side-by-side comparison highlighting operational, security, and compliance differences.

ElementtiCryptIn-House Solutions
Security architecture✔️ Integrated❌ Multi-layer
Dependence on multiple vendors✔️ No❌ Yes
Integration & maintenance costs✔️ None or minimal❌ High
Compliance costs (internal / consultants)✔️ Low❌ Substantial
External security assessment✔️ Proven record❌ Uncertain
Time to deploy✔️ Weeks❌ Months
Total cost of ownership✔️ Predictable❌ Unpredictable

Learn More

Explore our resources to better understand tiCrypt.

  • To learn more about our company, visit About
  • To learn more about our SSP blueprints, visit SSP
  • For an overview of system capabilities, see Features
  • To watch videos of the system in action, see Demo
  • To learn about licensing, support, and pricing, view Pricing