- Any kind of key-value. Clients can choose how to structure data.
- No data mutation APIs are provided.
- Data is never overwritten and is cryptographically verifiable.
- Address regulatory compliance: SEC 17a-4(f), CFTC 1.31(d), FINRA, and other regulations.
- Tamper-evident history system with cryptographic proof
- Secure document retention and store sensitive information that is critical to litigation or business use in a tamper-proof state for the desired duration.
- If tampered, clients and auditors will notice that and take actions.
- Data ownership is verifiable by clients and auditors. Built-in immutable data history against Ransomware (malware encryption).
- Sign your data using Public-Key Cryptography. Support for Intel SGX enclaves.
- Keys additions and revocations are immutably stored into the database.
Record data when it happens
Database changes, table history, data access, audit information.
Immediate data query
Extremely fast query engine and always ready to use.
Cryptographic verification built-in
Every entry is verifiable using cryptographic proof.
No archive system, data is online and never out of reach.
- Powered by immudb