We deliver encryption and authentication solutions that are simple to use and don’t disrupt systems or workflows. Get airtight security by having private keys split between multiple locations, safe from rogue admins, stolen credentials, device compromise or any single zero-day or malware.

Schedule a Demo

The Dyadic Product Family

Web

Secure your public facing interfaces; protect SSL keys, certificates, passwords, credit card numbers, user data.

Datacenter

Protect server secrets and stop attack propagation; protect SSH keys, credentials to other servers and more.

Cloud

Migrate servers to the cloud without losing control. Split secret protection between cloud and on premise.

Mobile

Secure, software-only, mobile-based digital transaction signing and authentication.

Why Choose Dyadic

  • Airtight secret protection based on technology rooted in years of academic cryptographic research.
  • Secure all secrets on all common platforms, server types and use cases, with a one-stop solution.
  • Detect data exfiltration and anomalous access or suspicious activity.
  • Platform agnostic. Seamless encryption and protection through configuration or a simple API.

At the core of Dyadic’s Distributed Security Module (DSM) lies cutting-edge technology based on decades of advanced cryptographic research in secure multiparty computation (MPC).

Professors Yehuda Lindell from Bar-Ilan University, Israel and Nigel Smart from University of Bristol, UK are two of the world’s leading authorities in the field of practical MPC. They have joined forces to apply their expertise to solve the acute problem of data compromise resulting from network and server breach.

Divide and Distribute – a New Approach to Counter the Flux of Security Breaches

Logjam and more SSL Woes

Password Security – Part 1