(+‪44) 01332 922160‬

Application-level Encryption for GDPR Compliance

Do you buy, build or use third-party software to work with GDPR-regulated personal information?  

If yes, why should your software put you and your data subjects at risk? 

Absio technology enables existing and new software to create and manage encrypted data everywhere, all the time. Software developers with no cryptography experience can integrate Absio with a few lines of code.

Compliance image


Object-level data encryption without calling a central server, so you can encrypt data anywhere or everywhere

Compliance image


Object-level metadata available wherever the data goes (access, permissions, classification, audit history, etc.)

Compliance image


Automatic PKI and event-driven architecture enable secure sharing between multiple users and synchronisation between devices

Compliance image


Data integrity is verified via hash-based message authentication codes, and all keys are signed to provide source verification

Compliance image

Application-level key management, obfuscation and encryption libraries

Originally developed to secure intelligence information in a battlefield environment where connections might be intermittent or completely unavailable, Absio’s software-defined, key management and Serverless Encryption® technology functions across platforms and devices without requiring a connection to a central server. A simple API enables software developers with no cryptography expertise to quickly and inexpensively add key management and data-level encryption to new and existing software without having to separately manage keys and certificates, buy and maintain hardware, or rely on a third-party service.

Absio’s developer toolset consists of multi-language software development kits (SDKs), and the optional Absio Broker™ application, that enable automatic PKI-based authentication, key generation and management, encryption and decryption, access and use controls, and data integrity verification with the addition of a few lines of code. Absio’s flexible architecture can support virtually any data security use case, dramatically expanding the operating environments and use cases for encryption.
with a few lines of code.

Absio Developer Toolset

Absio technology is implemented through multi-language software development kits (SDKs), and the optional Broker™ app, that developers with no data security experience can integrate into their new and existing software applications and services with a few lines of code.

Compliance image

Absio Data Encryption SDKs

Libraries compiled with software code that perform all key generation, encrypt and decrypt processes locally on the device, server or browser where the enabled application or service is running. Available in multiple languages and easily integrated via a simple API.

Compliance image

Absio Broker Application

A portable, Python application designed to work with the SDKs to store and route encrypted content and/or keys. An event-driven architecture enables data to be synchronized across devices and platforms. Can be deployed on-premise or in the cloud.

Core building blocks

The Absio libraries can automatically generate and manage keys for digital signing, authentication, data integrity and encryption. If asymmetric cryptography is used, copies of the public keys can automatically be sent to the Absio Broker application for verification and exchange. In addition, encrypted backup copies of private keys can be stored on the Absio Broker application for recovery purposes and/or for syncing between multiple devices.


The Absio libraries can automatically generate and manage keys for digital signing, authentication, data integrity and encryption, enabling your application to natively perform key management without needing to call an external service. All keys are generated on the device, server or browser running the application, not by a remote key server.

The Absio libraries handle all cryptographic functions and then provide the appropriate key and/or data object to your application via API methods. The libraries support cross-platform, OS-independent key exchange, encryption and decryption, source and integrity authentication, pseudonymization, secure communications and secure data storage using only FIPS-compliant algorithms. All cryptography is performed at the application level, enabling data security by design and by default.

The Absio libraries can associate metadata from any source to content (data type, classification, audit history, usage policies, etc.), enabling applications to consume and act on the metadata anywhere the data exists. The metadata can either be encrypted and bound to the data, or stored separately for rapid identification and processing without providing access to the content itself.

Encrypted data and keys can be stored wherever needed to support the security, workflow, performance and availability requirements of your application. If data and keys are stored together to enable offline access, they can be protected by Absio’s patented Obfuscating File System—a randomised directory of individually-encrypted, nonsensically-named objects with no identifying attributes.

The Absio Broker application uses an event-driven architecture to track and distribute key and data events. Developers can use the events to synchronize information and any key and/or data changes between multiple devices. Analytics software can consume these events to archive and evaluate user or system behavior.

Simple licensing model and high ROI

The Absio SDKs can be licensed per developer or per instance depending on who performs the development, and the number of locations where the production application(s) containing the libraries will be installed. We work closely with our customers to ensure our pricing is complementary to their business model wherever possible.

Volume and multiple language discounts are available. Contact us if you would like a custom quote for your organisation.

First language – $3,500


Additional languages – $1,750/50% Discount

Share on facebook
Share on linkedin