tiCrypt

End-to-End Encrypted Compute Environments

tiCrypt is a product of Tera Insights and the University of Florida Research Computing. It is a single, fully integrated platform for regulated workloads designed to exceed NIST 800-171/CMMC Level 2 requirements.

NIST 800-171/CMMC Level 2 Compliant
NIST 800-172/CMMC Level 3 Ready
Tera Insights LogoUF Logo

Are You an Academic Organization?

Learn more about tiCrypt and collaborate with leading research institutions.

Start Here

Is tiCrypt a Good Fit for Your Organization?

A simple four-point check to help determine whether tiCrypt aligns with your compliance, infrastructure, and deployment needs.

Fit & alignment

Four Questions

1

Does your organization handle regulated workflows (e.g., NIST SP 800-171/172, CMMC Level 2 or 3, ITAR)?

2

Are your workflows dependent on software outside Microsoft 365 that cannot run in GCC High?

3

Does your organization have the scale and resources to operate an on-premises secure environment?

4

Is your organization based in the United States or Canada?

Alignment Score

0/4
Not a good fit
Estimated outcome
Not well aligned with tiCrypt

Begin by answering each question.The score indicates whether your organization aligns with the conditions tiCrypt is designed to support.

Answered
0/4
Positive
0/4

No responses are stored, logged, or transmitted. Processed locally within your session.

Compliance

SSP Coverage (NIST 800-171 / CMMC Level 2)

tiCrypt provides a complete SSP blueprint (110 controls). Approximately 84 controls are platform-enforced (including hybrid controls where tiCrypt enforces the technical component). The remaining ~26 controls are organizational and require customer-specific policy edits (e.g., PE, AT, PS, and policy-driven areas).

NIST 800-171110 Controls
tiCrypt Controls
84/110 Controls Covered
AC(17/22)AU(9/9)IA(11/11)MA(2/6)RA(2/3)SC(16/16)CM(7/9)IR(1/3)MP(9/9)CA(3/4)SI(7/7)
Organizational Controls
26/110 Controls Covered
AC(5/22)MA(4/6)PS(2/2)RA(1/3)AT(3/3)CM(2/9)IR(2/3)PE(6/6)CA(1/4)
Minimize compliance risk through platform-enforced controls

tiCrypt Core Features

Core features include a secure Vault for file storage and sharing, controlled access to virtual machines via RDP and terminal sessions, and integrated administrative tools for managing users, permissions, and system activity.

tiCrypt vault storage and sharing interface
Encryption

User-Centric PKI

tiCrypt provides end-to-end encryption for file access, sharing, and processing, with a security model built on public-key cryptography. Every user holds their own RSA-2048 key pair, while all drives, files, and data are end-to-end encrypted with AES-256. Administrators cannot access user data unless it is explicitly shared with them.

  • RSA-2048 key pairs are generated at registration, and the private key never leaves the user.
  • All authentication is based on digital signatures, not stored credentials.
  • AES-256 encryption is managed through PKI for every file and drive.
  • Without the decryption key, stored data is useless, even to administrators.
  • Secure key recovery is handled through multi-party approval.

Virtual Machines

Encrypted Virtual Machines

tiCrypt runs computation inside isolated Linux, Windows, clustered, and batch-processing VMs with encrypted storage, controlled networking, and full session auditing.

  • VM drives are encrypted with LUKS or BitLocker, with keys held by the data owner.
  • The control channel uses WebSockets into the backend, encrypted and authenticated by digital signature.
  • Backend services and administrators have no access to VM contents.
  • Stand-alone, clustered, and batch-processing VM configurations support a wide range of workloads without complex remote access tooling.

Compliance

Compliance Built Into the Architecture

tiCrypt enforces encryption, isolation, audit logging, and reporting at the platform level, reducing reliance on manual procedures and lowering operational overhead for regulated environments handling CUI, ITAR, and FISMA-driven workloads.

  • CMMC 2.0 Level 2 certified.
  • NIST 800-171 certified.
  • FIPS 140-3 compliant cryptography.
  • Built-in audit reporting and system monitoring.
  • Reduced compliance burden through controls enforced by design.
Permission
tiCrypt permissions frame 1tiCrypt permissions frame 2tiCrypt permissions frame 3tiCrypt permissions frame 4tiCrypt permissions frame 5tiCrypt permissions frame 6tiCrypt permissions frame 7tiCrypt permissions frame 8tiCrypt permissions frame 9tiCrypt permissions frame 10tiCrypt permissions frame 11tiCrypt permissions frame 12tiCrypt permissions frame 13tiCrypt permissions frame 14tiCrypt permissions frame 15tiCrypt permissions frame 16
SLURM HPC cluster orchestration within tiCrypt
High Performance Computing & SLURM

Secure HPC with Split-Instance SLURM

tiCrypt separates HPC scheduling from execution using split-instance SLURM. A global SLURM instance handles resource allocation and accounting, while local per-project SLURM instances execute jobs inside secure VMs against data and code available only within the authorized project environment.

  • Global SLURM handles resource allocation and accounting through a service account.
  • Local SLURM runs per project inside secure VMs, executing jobs against data and code available only within that authorized environment.
  • Secure VMs become nodes integrated into the local SLURM cluster.
  • Scheduling and execution are separated so the global instance never sees user data.
  • SLURM job submission, interactive compute, and controlled data ingestion happen from secure environments.

Management

Multi-Organization Management

tiCrypt provides a unified platform for managing users, projects, data, access, audit, and collaboration across departments and organizations, reducing the need for complex, multi-tool environments.

  • Role-based delegation lets system administrators focus on infrastructure while project leads manage their own users and activities.
  • Seamless SSO authentication supports collaboration across multiple organizations.
  • Every operation is tracked through centralized logging and monitoring, creating a full audit trail.
  • RPM-based deployment supports existing on-premises or cloud bare-metal infrastructure.
Users

What Our Customers Say About tiCrypt

"Our independent security review and penetration test of tiCrypt revealed an exceptionally strong, defense-in-depth architecture aligned with NIST SP 800-171. The platform incorporates non-default security design choices not commonly encountered in comparable systems. We were particularly impressed by the overall security architecture and the team’s responsiveness."
Guillermo Munoz, M.A., CISSP, CEH
Senior Information Security Architect, Harvard Medical School
"We have been working with Tera Insights for about a decade on building a computing environment for working with restricted data that is flexible, highly secure, and straightforward to manage. With constant feedback from researchers, the environment has matured to meet the demands of very complex workflows."
Erik Deumens, Ph.D.
Senior Director, UFIT Research Computing, University of Florida

Why tiCrypt?

tiCrypt is a single-stack solution designed for secure, compliance-ready data processing at scale.

tiCrypt vs Traditional In-House Solutions

A side-by-side comparison highlighting operational, security, and compliance differences.