Products

Absio libraries enables web, mobile, desktop, cloud-native, server, IoT and other software to automatically create and manage encrypted data

Absio's software libraries can be applied to a wide range of applications and services, running on just about any device, via a simple API. The software packages are integrated into the application software, so the app natively performs the functions without needing to call/rely on an external service. The libraries are available in multiple software languages to support cross-platform software development. If application data needs to be used on multiple devices by multiple users, Absio’s software libraries can be combined with the Absio Broker application for key and data backup, synchronization and exchange.

Desktop
Mobile
IoT
Server
Browser
More

Learn more about Absio technology

Absio Data Encryption SDKs

Libraries compiled with software code that perform all key generation, encrypt and decrypt processes locally on the device, server or browser where the enabled application or service is running. Available in multiple languages and easily integrated via a simple API.

Absio Broker Application

A portable, Python application designed to work with the SDKs to store and route encrypted content and/or keys. An event-driven architecture enables data to be synchronized across devices and platforms. Can be deployed on-premise or in the cloud.

How you can use it

Developers can choose to leverage some or all the key features of the Absio developer toolset. Its flexibility, ease of implementation and integration capabilities support virtually any data security use case.

Manage Keys

Primary Use: Generate and manage cryptographic keys for digital signing, authentication, data integrity and encryption

Benefits: Software-driven; no additional hardware required; no need to rely on or trust a third-party service

Secure Messages

Primary Use: Protect the integrity and confidentiality of communications

Benefits: Can be added, or used as an alternative, to transmission security; fully portable (no need to download keys and content separately)

Secure Data Containers

Primary Use: Protect and manage content shared with users across platforms and devices

Benefits: Cross-platform, OS-independent solution for secure data creation and management without sacrificing data mobility

Request a demo

Features

Automatic Key Generation & Management

Generate and manage keys for PKI-based authentication and symmetric encryption

 

Serverless Encryption® 

Encrypt and decrypt data without calling a central server

 
 

Flexible Key & Data Storage

Store encrypted content, metadata and/or keys wherever needed per application requirements

 

Metadata Association

Apply and secure any type of metadata so it is available wherever the data goes