We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

ENVEIL — Never Decrypt Your Data (Always Keep Encrypting)

Emma Browne Cybersecurity Researcher

It should not come as any surprise that the mantra repeated by Dr. Ellison Anne Williams, the CEO and founder of ENVEIL is “Encrypt Your Data.” As you will see, she actually goes further with her company’s tagline, which is “Never Decrypt.” It is not surprising because before establishing ENVEIL, Ellison spent over a decade as a Senior Researcher at the U.S. NSA (National Security Agency). It was there that the core technology of the ENVEIL platform was developed and field-tested.

I would normally start by asking you to tell me about your background and experience, but I am guessing that since before founding ENVEIL you spent 12 years as a researcher at the NSA (National Security Agency) you are not going to be able to tell me very much.

That is pretty much correct [Laughs]. I joined the NSA after graduate school. Before hiring me, they would not tell me what I would be working on, but promised me that it would be “really cool.”

Let’s just say that I worked on various projects dealing with what we now call “Big Data.”

What was it like to move from a government research lab to a commercial startup?

I absolutely love it. I always wanted to go out on my own. Even while I was working inside the NSA, I was always starting new things.  Now, however, I get to work in an environment that is smaller and more agile.

How exactly do you take a technology developed inside the NSA and commercialize it for yourself?

The core technology of ENVEIL was developed and used inside the NSA. However, I was able to take portions of that technology out of the NSA to be commercialized. The NSA actually has a formal process in place for this, called the Technology Transfer Program. It is a long and not easy process, but it is doable if you are tenacious enough. I was also fortunate to have several people who worked for me at the NSA join me at ENVEIL.

Before getting into the specifics of ENVEIL, can you share your top three enterprise security tips?

  1. Encrypt Your Data.
  2. Encrypt Your Data.
  3. Encrypt Your Data.

People and organizations are simply not employing basic security practices by securing their sensitive data.

Your tagline – or mission statement – is “Never Decrypt.” How can applications access their data when it is encrypted? Does using ENVEIL require modifying an application’s source code?

Employing ENVEIL is not at all intrusive to your existing environment and applications. That means that it does not require any charges to your system architecture or application code.

The way it works is that we are a proxy layer on top of your data storage. There is a client application that is deployed either on each device or as a centralized gateway. This app communicates with a server application that is deployed in the environment of the data storage. The server app is granted access to whatever data source it is protecting.

To be a little more technical, our client application is a drop-in replacement for the JDBC (Java Database Connectivity) API and for standard REST (Representational State Transfer) APIs.

The critical point is that no data is ever decrypted while being processed in the cloud/public space. Our framework allows you to operate on data (query/analytics) without ever revealing the content of the interaction, the results, or the data itself. This is because we use homomorphic encryption, which allows us to perform computations on encrypted data as if they were unencrypted.

enveil revealing

enveil never

How do you define your target market?

The ENVEIL framework is appropriate for anyone that is security conscious and concerned about their data, regardless of whether it is located on-premises or remotely. Our technology is valuable across all verticals, although to date we have received the most interest from:

  • Financial Services
  • Healthcare
  • Data Aggregators

What does your pricing model look like?

As with most enterprise software, our pricing model is a based on a yearly subscription. Right now, we offer one variety, which we call “All You Can Eat” – meaning that you get unlimited users, unlimited transactions, and unlimited data transfer.

How many active customers do you have today? Where are they mainly located?

Although the technology itself has been in use for many years (inside the NSA), the company itself is still very young. We are currently working with several big banks and large healthcare companies located in the U.S.

Whom do you see as your main competitors?

We do not have any direct technical competitors – there is no one doing what we are doing.

Of course, we do still have competition, in the form of people continuing to work the way they always have or adopting various workarounds to try to achieve the same goals.

What are your future plans for ENVEIL?

Our overarching objective is to foster a heightened understanding of the imperative need for data encryption across all stages. This includes advocating for the protection of data at rest, data in transit, and data in process, underscoring the importance of safeguarding information at every possible juncture.

More specifically, we are going to strive to grow as a company by focusing on two main areas:

  1. Continued enhancement and extension of our core capabilities.
  2. Additional, deeper, and richer secure, encrypted analytics.

How many employees do you have today? Where are they located?

We are currently seven employees, all located outside of Washington, D.C.

How many hours a day do you normally work?  What do you like to do when you are not working?

I would have to say that I work 27 hours a day… [Grin]

When I am not working, I love to cook and bake – I am a serious foodie.

We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

About the Author

Emma Browne is a professional writer and editor specializing in software and cybersecurity. She's passionate about the intersection of human behavior and technology, and particularly how that affects online privacy.

Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
out of 10 - Voted by users
Thank you for your feedback

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address

Thanks for submitting a comment, %%name%%!

We check all comments within 48 hours to ensure they're real and not offensive. Feel free to share this article in the meantime.