Company attributes
Other attributes
Enveil is a data security company working to protect data during usage, such as when sharing, collecting, searching, and processing data. Its Privacy Enhancing Technologies (PETs) are powered by machine learning and artificial intelligence. The company's platform offers capabilities for secure data usage, collaboration, and monetization, which securely derives insights, cross-match, and search third-party assets without revealing the contents of the search or compromising security or ownership of the underlying data.
The company was founded in 2016 by Ellison Anne Williams and US intelligence community alumni with backgrounds in mathematics, algorithmics, and machine learning and is headquartered in Fulton, Maryland. Applications for Enveil's technology range across government and commercial uses, including financial services, health care, data monetization, audit and compliance, and cloud security, with initial use cases focused on helping financial services companies and regulators prevent money laundering and financial fraud.
Enveil's privacy enhancing technologies (PETs) are a series of technologies to enable, enhance, and preserve privacy of data throughout the lifecycle to help users secure their usage of data. This family of technologies allows data assets to be securely and privately used, offers a path to extract critical insights without need to move or replicate data, and enables users to pursue data sharing and collaboration practices while remaining in compliance.
These technologies use homomorphic encryption. This technology originated in the National Security Agency (NSA), where founder and CEO Ellison Anne Williams spent her career prior to founding Enveil.
This type of encryption is algorithmic and designed to allow mathematical operations to be performed on encrypted data, and the data can be processed while in use using this type of encryption, rather than just at rest or in transit. This means the data processing can be outsourced to a third party without need to trust the third party to properly secure the data, and without the proper decryption key, the original data cannot be accessed.
According to Enveil, this gives users nation state level security, and is considered by some to be a development of encryption, because it allows for computation in the encrypted or ciphertext space.
ZeroReveal offers several solutions for companies to secure their data in use and continue to perform computations on that data. This includes the ZeroReveal Search, which allows users to perform searches on any data in any environment while safeguarding the sensitive data. The Search function does not require changes to a user's system architecture, data storage format, or technology, while it allows users to extend their trusted compute environments into untrusted locations. As well, the ZeroReveal Search Client and Server Applications function as a point-to-point proxy layer to perform secure computation as well.
ZeroReveal ML offers users advanced decisioning through collaborative and federated machine learning in a secure and private capacity. ZeroReveal ML works to keep results encrypted through an evaluation lifecycle, which, in turn, allows those enterprises to develop insights from data sources across jurisdictional, third-party, and organizational boundaries.
Enveil's ZeroReveal Compute Fabric is a two-party, proxy layer software system. It consists of the ZeroReveal client application, which lives in the enterprise, and the ZeroReveal server application, which is deployed at the data center where data is stored. This compute fabric application requires no changes to architecture or storage technologies, works through standard APIs, and works to perform the operations of the ZeroReveal program, such as searches and analytics, without decrypting the content of the search or analytic.
The use cases of Enveil's ZeroReveal include use in financial services, healthcare, data monetization, audit and compliance, cloud security, and federal or governmental use. It offers these different industries and sectors secure data collaboration, secure data ownership, third-party risk reduction, security for edge computing cases, and regulatory compliance. It also enables users to perform computation in untrusted locations.