DEV Community

Cover image for 2 free data security tools every dev should know (and use)
Cossack Labs
Cossack Labs

Posted on

2 free data security tools every dev should know (and use)

The goal behind encrypting sensitive data is to prevent leakage if the application or the database was attacked. Application level encryption (encrypt data before storing in the database, decrypt after reading) provides maximum protection.

💡 To help developers integrate encryption easily and without hassle, we maintain several open-source data security tools that you can download from GitHub and use for free.


Acra database security suite by Cossack Labs

Quickly encrypt your sensitive data in SQL/NoSQL databases and distributed apps with Acra.

As a database security suite, Acra provides 9 strong security controls in one shot to solve your data security vital needs.

We designed Acra to be flexible and reliable, easy to install and use.

💡 With no huge changes in code, you can encrypt data using application level encryption before storing it in the database. Besides encryption, Acra supports search over encrypted data, data masking and data tokenization, SQL request firewall, audit logging, and many other features.

The latest version of Acra Community Edition is available on Github:
📥 https://github.com/cossacklabs/acra


Themis by Cossack Labs

Themis is an open-source high-level cryptographic library, perfect for protecting sensitive data (PII, locations, etc.) in most applications.

Add Themis in your app for secure data storage, secure message exchange, secure socket connections, and authentication across 15 platforms and languages.

💡 Themis keeps trusted, verified, and audited cryptography under the hood, so you will be protected from making security and cryptography mistakes.

Download the latest version of Themis from Github:
📥 https://github.com/cossacklabs/themis


Check these free tools out, use them, and keep your data protected. 🔐
Follow @Cossack Labs for more updates!

Top comments (0)

Some comments have been hidden by the post's author - find out more