Crypto Search Engine

It allows you to save sensitive data and files in the Cloud.

Secure internal and external file sharing across platforms and a completely end-to-end encryption.

Fully Controllable
Centralized administration for enterprise management for a fully control of the solution.

High Performance
High performance encryption and search engine that can replace any existing (lower security) solution.

Protect your data
Protect / encrypt large amounts of data without slowing you down.

Encryption keys are owned, managed and stored only by the customer.

Thanks to the API developed can be easily integrated into existing systems.

Cloud secure
Eliminate unauthorized access and risk of exposure by removing the necessity to decrypt files to manage and search data in the Cloud.

Friendly Support
Reduce IT support costs.

CryptoLab was founded in 2009 as a research laboratory in the information security industry by Massimo Bertaccini, Tiziana Landi and Alessandro Passerini and deals with computer security.

Encryption is the mathematical basis for the determination of the codes that protect everything related to IT and digital security. 

The importance of this science is critical to the development of innovative technologies such as cloud computing, virtual payment and in general for everything related to the Internet and electronic commerce.

The CryptoLab algorithms pose as a basis the principle of more security at a lower computational cost.

  • CSE How much does cost?

    Here are the packages

  • CSE what is?

    CSE is software that enables the storage, sharing and text searches anonymously on Cloud.

  • CSE benefits me?

    CSE lets you save your files safely on Cloud. A unique feature is the ability to search without decrypting files, and without that Cloud is aware of the searches you have performed.

  • Which encryption algorithm is used?

    CSE uses standard encryption (AES-CBC-256) for saving data in the Cloud. The research in the files are encrypted and are made using proprietary protocols of CryptoLab. Communications are also protected by standard HTTPS protocol.

  • What are the CSE API?

    The CSE APIs are used to control the CSE by a third-party application.

  • Which data Cryptolab collets?

    The only information that CryptoLab collects are:

    • UUID of each virtual machine
    • type of virtual machine (Encryption Engine, Manipulation Engine, ecc)
    • IP address of the machines
  • Why these data is collected?

    CryptoLab collects this data for monitoring and verifying the proper operation of the installed systems and to ensure the proper use of software licenses.

No decryption is necessary to manage and search data in the Cloud

unauthorized access and risk of exposure.

Encrypted Storage

Cyber Security Agency secures your business, employee, and customer data from unauthorized access and theft.

We protect your information’s confidentiality and integrity from malicious or careless employees, unethical cloud storage employees, scammers, hackers, and prying government agencies.

Cyber Security Agency Encrypted Storage Approach

Cyber Security Agency encryption storage approach provides your business with data encryption and decryption services for both data in transit and data at rest. Our storage encryption features are suitable for all storage mediums, including storage area networks (SANs).

Cyber Security Agency encryption storage approaches harden the core of your storage options at low costs. We use multiple ciphers to encrypt folders, data volumes, and individual files.

We also use two primary criteria to determine the effectiveness of your encryption storage plan. We ensure the costs incurred to implement a data encryption scheme is a small fraction of the encrypted data’s value.

Our storage encryption measures assure you that it costs hackers more time and money than the value of the encrypted data, thus discouraging breaching attempts.

Cyber Security Agency Capabilities

Our storage encryption capabilities focus on securing both data in transit and data at rest. The following are our encryption capabilities:

Data at rest

Full Disk Encryption: The primary way Cyber Security Agency encrypts data at rest
File encryption: We use this method to encrypt data on a file to file basis

Data in transit

End-to-end encryption: Our end-to-end encryption ensures data in transit is only visible to the recipient and sender, hence controlling liabilities in your organization’s communication chain
Encrypting web connections: We implement Secure Sockets Layer (SSL) and Transport Layer Security (TLS) encryption protocols to encrypt any data you receive or transmit using web applications and browsers.
Encrypting email servers: We provide Secure/Multipurpose Internet Mail Extensions (S/MIME) public-key encryption services to provide your email servers with an edge when sending or receiving messages.
Pre-encrypting software: We provide your business with pre-encryption software and tools to ensure all your data is encrypted before transmission. Data pre-encryption secures your information when uploading it to the cloud or sharing it using insecure means.

Data is among the most valuable assets to an organization today. Have you implemented sufficient encryption technologies to prevent unauthorized access and information loss?

Contact us today for all your storage encryption needs


Homomorphic Searching : Data is often communicated across networks and stored on remote servers which may be unsecured and non-private; eventually it needs to be browsed, searched and manipulated regardless on the location where it is hold. In case of sensitive and super sensitive (e.g. health care) data, it needs to be kept secured and private throughout the whole process. State of the art technology on sensitive data management on remote servers reaches the objective via sub-optimal combinations: sensitive data is usually made secure by local encryption, then communicated and remotely stored; upon requests to browse or search, it is decrypted on the remote server and then accessed; if manipulation is requested, even an additional encryption is necessary.

Crypto Search Engine – CSE – is the technological solution to all this, as it is able to offer search/browsing/manipulation on encrypted data, that is with “Zero Knowledge”: encrypted sensitive data stored on public cloud providers will eventually be fully accessible by data owners only, still allowing cloud providers to offer search/browsing/manipulation over encrypted data by means of “encrypted queries”, herefore preserving the Zero Knowledge. On one side, private users could take back the legitimate ownership of the value of their data and eventually trade it back to service-providers through a fair deal, which is very different from the “take-or- leave” approach that we currently witness. On the other side, public administrations, institutions and critical infrastructures would be legitimated in the use of a multiplicity of public cloud providers for safe and redundant data storage, with important impact in cost reduction and also enabling access to tools for big data analysis.

Offering search/browsing/manipulation on encrypted data is a unique and unprecedented feature that will have a disruptive effect on any market where sensitive digital data is generated, communicated, stored and processed.

Crypto Search Engine (CSE)

The privacy issues that surround the Internet and cloud regular users is a concern for businesses and individuals.

Save sensitive data and files in the cloud with Crypto Search Engine (CSE). CSE solution enables the storage, sharing, and text searches anonymously on the cloud.

CSE Capabilities

CSE gives you full control, and no company can lay claims on your data in the cloud. Besides, cloud service providers cannot access your search history and other related information.

Benefits Of CSE

Secure: CSE features end-to-end encryption allowing secure internal and external file sharing across platforms

Enhanced Privacy: Owners own, manage, and store the encryption keys. You don’t have to worry about cloud providers monitoring your search profile and selling it to third-parties

Fully Controllable: You gain full control of the solution through centralized administration for enterprise management

API: CSE API allows you to integrate the solution into existing systems easily

High Performance: CSE offers high-performance encryption and search engine that can replace existing and insecure services

Cloud Secure: CSE eliminates risks of exposure and unauthorized access by allowing you to keep your data encrypted in the cloud

Cost-Effective: We offer friendly support, allowing you to reduce IT support costs

Try out Cryptolab CSE today to search encrypted data without decrypting it beforehand.