Cyber Defense Names Us a Hot Company

We’re pleased to report that Cyber Defense Magazine has recognized us as a “Hot Company” in Privacy-Enhancing Technology in its Top Infosec Innovator Awards 2025 for our next-generation encryption solution, Seshat. The announcement was made October 28th, 2025 during CyberDefenseCon 2025, an invitation-only conference for top Global CISOs at The Ritz-Carlton in Orlando, Florida.

We are honored to be recognized, and believe that it validates the strength of our approach to Privacy Enhancing Technology. By keeping data encrypted even while in use, Donoma Seshat eliminates the problem of data loss.  It provides a better method of restricted access at a fraction of the cost of traditional encryption solutions, while simultaneously offering the ability for organizations to get more value out of their data.

In case you don’t already know it, Donoma Software’s Seshat platform is a quantum-resistant Privacy Enhancing Technology (PET) that protects enterprise and AI data, legacy applications, and other sensitive information from being exposed.  By keeping data continuously encrypted, even while it is actively in use, Donoma Seshat effectively solves the problem of data loss.  Even if data is accidentally or intentionally leaked by employees, it will not be readable.  It is scalable and deployable using standard CPUs, does not require modifications to existing software applications or the hardware stack, and makes continuous encryption just as fast as a native application.

“We scoured the globe looking for cybersecurity innovators that could make a huge difference and potentially help turn the tide against the exponential growth in cyber crime.  Donoma Software is worthy of being named a winner in these coveted awards and consideration for deployment in your environment,” said Yan Ross, Editor of Cyber Defense Magazine.

If you are ready to get serious about your data protection strategy, sign up for a solution discussion today!

Learn more:

Seshat: Data Privacy Preservation for Enterprise

Donoma Puts the Brakes on Data Loss with Next-Generation Privacy-Enhancing Technology

The Encryption At Rest Myth: Why Your Encryption Strategy Fails to Protect Data

Data Encryption: Understanding the Often Unseen Vulnerability You Must Avoid

The Case for Continuous Encryption in Healthcare