Ionic Encrypted Search (IonES) system is a lightweight and scalable multi-user searchable encryption solution that enables users to search and retrieve protected documents in a provably secure way. Sign up for a private beta today.
Adam Ghetti, founder and chief technology officer of Ionic Security, discusses how establishing trust in a digital world can cause paralysis. He defines data trust– as the intersection of security, privacy, accountability, and integrity– and outlines how diverse business stakeholders perceive trust.
Ionic Data Trust Services for Cloud Storage, with coverage for AWS S3 and GCS, today announced preview capabilities for Azure. This brings Ionic’s machine-scale encryption, policy orchestration, and visibility across the three major CSPs.
Joseph’s fascination with codes and ciphers dates back to elementary school, and his career trajectory includes in-depth experience with security operations and threat detection. I sat down for some Q&A with Joseph to find out how this background translates to his mission to improve the power and flexibility of the products we build at Ionic.
Overseeing business development, sales, marketing, and legal, Robert is a true road warrior. I caught up with Robert late one afternoon to delve into his background in scaling major successes like Akamai. Robert also dedicates time to organizations who develop privacy regulations and policies, which is so relevant to Ionic’s mission of data protection.
Darrell takes a balanced approach to assessing new technology; he’s inspired but practical in the search for effective and manageable solutions. I caught up with Darrell to learn more about his connections to other Ionic leaders, his approaches to scaling an organization, and his passion for sports.
Ionic Security uses publicly available libraries to implement some of its cryptographic primitives, such as elliptic curve scalar multiplication. For this reason, Ionic is careful to distinguish between trusted and trustworthy libraries. To illustrate the difference between…