Proof of consent requirement.

We encrypt data at REST, even if you don't. We support your existing authentication system; Auth2, 2FAs, JWT Authentication Method, MFA, and more.

Proof of consent requirement.

To operate on data, Swiftend requires cryptographic proof that an authenticated data subject gave consent to the operation.

Personal data is between you and your users. Data is encrypted with AES-256 before it leaves your firewall, and only decrypted in your data subject’s browser.

User
centric

  • User consent is specific and unambiguous
  • Identity flow always through User
  • Customers always in the protocol

User
controlled

  • User interaction is always required
  • Identity flow is user controlled by means of policies
  • Users have relying parties

User
consented

  • User interaction is no option
  • Identity flow is always controlled by authorities
User Consented
User controlled
User centric

End-to-end encryption.

Personal data is between you and your users. Data is encrypted with AES-256 before it leaves your firewall, and only decrypted in your data subject’s browser.

Personal data is between you and your users. Data is encrypted with AES-256 before it leaves your firewall, and only decrypted in your data subject’s browser.

International Best Practices.

We follow industry best practices. All internal communication is done via encrypted channels and we conduct regular security audits. We conduct continuous security audit and partner data is strongly silo-ed.