tiCrypt – A Complete NIST 800-171/CMMC Level 2 Compliant Solution

For US & Canadian Defense Contractors.

tiCrypt is a product of Tera Insights and the University of Florida Research Computing. It is a single, fully integrated platform for secure data processing designed to exceed NIST 800-171/CMMC Level 2 requirements.

NIST 800-171/CMMC Level 2 Compliant
Tera Insights LogoUF Logo

tiCrypt Screenshots

tiCrypt Vault

tiCrypt Vault

Why tiCrypt?

tiCrypt Security

tiCrypt establishes a secure, encrypted communication channel between users and compute resources, providing VPN- and firewall-like protections without requiring separate networking or security software.

tiCrypt implements a zero-trust, end-to-end encryption model in which all data is encrypted using strong cryptography and can be decrypted only by authorized users holding private keys.

Encryption is enforced consistently, does not rely on passwords, and prevents servers or administrators from accessing data - even in the event of a server breach.

Data and communications are end-to-end encrypted

tiCrypt Components

tiCrypt runs on-prem and consists of:

  • tiCrypt Connect, a lightweight front-end that runs on the user’s computer (Windows, macOS, Linux)
  • A set of back-end services running on a Red Hat Enterprise Linux server
  • Virtual machine (VM) controllers that manage secure environments
  • Customer-provided compute resources, including CPU, memory, and storage, used for secure workflows
No external software dependencies

Built to Scale

tiCrypt is hardware agnostic, highly scalable, and operates without additional software dependencies, enabling rapid deployment within weeks.

Hardware agnostic, at any scale
Fast deployment

Proven Compliance Track Record

tiCrypt has a strong and established compliance history: 100% of customers have passed external NIST 800-171 and CMMC Level 2 audits, with successful assessments dating back to 2017.

Proven compliance track record

Value for Money

Pricing is transparent and predictable, with licensing and support provided under a single annual agreement that delivers strong value.

Predictable cost, value for money
What Our Customers Say About tiCrypt
"Our independent security review and penetration test of tiCrypt revealed an exceptionally strong, defense-in-depth architecture aligned with NIST SP 800-171. The platform incorporates non-default security design choices not commonly encountered in comparable systems. We were particularly impressed by the overall security architecture and the team’s responsiveness."
Customer avatar
Guillermo Munoz, M.A., CISSP, CEH
Senior Information Security Architect, Harvard Medical School

In-House VDI Solutions

Organizations can attempt to build a compliant VDI solution in-house. A range of technologies exist that address virtualization, such as VMware, KVM, Nutanix, Microsoft Hyper-V, and OpenStack.

These platforms provide the infrastructure layer for running virtual machines and are a necessary building block for an in-house VDI environment. However, they do not, on their own, deliver end-user access or a secure, compliance-ready workspace.

Complex Integrations

To make such environments usable, organizations must add technologies such as Citrix or VMware Horizon as well as additional components that are required for user access control, data protection and encryption, auditing and logging, and policy enforcement.

  • ⚠️The more integrations, the more dependencies and complexity

Vulnerabilities

Traditional in-house solutions typically rely on partial or centrally managed encryption, often tied to passwords or administrative access. As a result, administrators or compromised backend systems may be able to decrypt sensitive data, increasing the attack surface and risk of exposure.

  • ⚠️ Increasing risk of data exposure and admin access

Unpredictable Costs

In practice, in-house VDI solutions involve multiple vendors and tightly coupled integrations, increasing operational complexity and placing the full burden of integration, ongoing maintenance, and audit readiness on the organization.

  • ⚠️Unpredictable escalating costs and maintenance

Why Not tiCrypt?

tiCrypt replaces this multi-vendor stack with a single, integrated solution purpose-built for secure, compliance-ready data processing - reducing deployment time, operational complexity, compliance risk, and overall cost.

tiCrypt vs Traditional In-House Solutions

A side-by-side comparison highlighting operational, security, and compliance differences.

Security architecture
tiCrypt
Integrated
In-House
Multi-layer
Dependence on multiple vendors
tiCrypt
No
In-House
Yes
Integration & maintenance costs
tiCrypt
None or minimal
In-House
High
Compliance costs (internal / consultants)
tiCrypt
Low
In-House
Substantial
External security assessment
tiCrypt
Proven record
In-House
Uncertain
Time to deploy
tiCrypt
Weeks
In-House
Months
Total cost of ownership
tiCrypt
Predictable
In-House
Unpredictable

Learn More

Explore our resources to better understand tiCrypt.

  • To learn more about our company, visit About
  • To learn more about our SSP blueprints, visit SSP
  • For an overview of system capabilities, see Features
  • To watch videos of the system in action, see Demo
  • To learn about licensing, support, and pricing, view Pricing