Enterprise Data Encryption Software
Portal26 Encrypted Search Plugin Keeps Enterprise Search Data Secure
Are you worried about securing Elasticsearch and OpenSearch? Portal26 provides the industry’s most advanced data encryption solution that plugs into Elasticsearch and OpenSearch and delivers NIST FIPS 140-2 validated data encryption without losing the full featured search capabilities that makes these platforms so powerful in the first place.

Is Search Getting in the way of Security?
Portal26 extends traditional data encryption to go beyond data-at-rest and data-in-transit to include data-in-use. Using high-performance encryption-in use Portal26 enables platforms like Elasticsearch and OpenSearch to retain their powerful search capabilities while becoming extremely secure. With this new defense in place, sensitive data inside Portal26 enabled enterprise search platforms to becomes immune to compromise at the hands of external attackers, malicious insiders, or accidental exposure. Any data queried or otherwise exfiltrated retains encryption and cannot be used as leverage against the enterprise even if it is accessed using admin privileges. This makes Portal26 an extremely valuable data encryption solution.
Are infrastructure costs exploding because each customer requires their own data nodes?
Portal26 allows index level encryption keys thus making it possible to store multiple customers’ data on the same node while ensuring complete isolation of data between customers. For large deployments this can result in over 60% reduction in node count and associated costs.
Are privacy savvy customers asking to hold their own encryption keys?
Portal26 comes with BYOK/HYOK out of the box so that every customer can either supply their own keys or store their own keys in their own external key vaults. Portal26 enables external key registration for key vaults residing across clouds and data centers for the industry’s most versatile and rich data privacy options for enterprise search customers.
Portal26 Encrypted Search Plugin Key Features

Searchable Encryption

Transparent Security

Private Data Release

Encryption Keys, BYOK/HYOK

Audit, Compliance, and Post-Attack Support
