Donoma Puts the Brakes on Data Loss with Next-Generation Privacy-Enhancing Technology

digital code overlaid with a lock

Data encryption is a fundamental element of every viable enterprise cybersecurity strategy. But up until now, continuous (homomorphic) encryption has been difficult and expensive to deploy, due to its slow speed of processing and complex compute resource requirements.

With the introduction of Seshat, Donoma Software is bridging the gap between privacy innovation and commercial availability with its newest solution.  Named after an Egyptian goddess responsible for guarding and preserving knowledge, Seshat is a privacy enhancing technology that protects enterprise and AI data, legacy applications, and other sensitive information. Seshat effectively solves the problem of enterprise data loss by keeping data continuously encrypted, even when it is actively in use. Even if data is accidentally or intentionally leaked by employees, it will be useless.

Seshat is designed to run on any platform and doesn’t require specialized hardware, making it much more affordable than other continuous encryption solutions, while delivering unprecedented levels of speed and scalability. Unlike traditional Privacy Enhancing Technologies that require massive computing resources and slow network systems by a factor of up to 1,000x, Seshat works at native speed on standard hardware.  

With Seshat, Donoma is providing a deployable solution to data breaches, which are currently forcing organizations to incur billions of dollars in unnecessary costs, as well as endangering the data privacy of individuals around the world.  Encryption becomes seamless – the user doesn’t even know that Seshat is there, working in the background.  The organization doesn’t have to modify its hardware stack, and it requires minimal changes to the applications.  It makes encryption just as fast as a native application, and it is scalable and deployable using standard CPUs.

Perimeter-based cybersecurity solutions cannot address the persistent threats that are known to already exist inside a network’s perimeter.  Software vulnerabilities are being exploited and weaponized at increasingly higher frequency on a massive scale, yet remediation only takes place after the damage has already occurred, making perimeter-based solutions inadequate as the only means of defense. In addition, internal compromise poses a significant threat to enterprise networks, either due to poor configuration or active exploitation attempts happening from within the organization. The Cybersecurity Insiders 2024 Report indicates that 83% of organizations reported insider attacks in 2024, with 51% experiencing six or more attacks in the past year.  The average cost of remediation exceeded $1 million for 29% of respondents.

The recent Coinbase data breach is a great example – according to the company, the breach did not result from a technical vulnerability in its systems, but rather was perpetuated from within, by support agents who abused their legitimate access to steal the data. The breach compromised sensitive personal information of almost 70K users, including names, addresses, phone numbers, email addresses, masked social security numbers, bank account details, government-issued ID images, and account-related information such as balance snapshots and transaction histories. This unauthorized activity commenced around December 26, 2024, and persisted until its detection in May 2025.  As a result, Coinbase is facing at least six class action lawsuits in US federal courts alleging that Coinbase failed to implement and maintain adequate security protocols, exposing users to serious risks. In response to the breach, Coinbase has refused to pay the $20 million ransom demand and instead offered a $20 million reward for information leading to the identification and prosecution of the attackers. The company estimates that the incident could cost between $180 million and $400 million, accounting for remediation efforts and reimbursements to affected users.

Seshat is the first and only solution that shields sensitive data with a unique methodology for continuous quantum-resistant encryption that keeps data private while in use, as well as at rest or in transit.  It not only helps organizations protect their sensitive data, it also preserves their brand value and their bottom line by eliminating the need for onerous reporting around data breaches, as well as the reputation damage and ensuing litigation.

Ready to take your encryption to the next level?  Schedule a demo today.

Additional Resources

Seshat Secure: Unmatched Data Privacy Preservation for Enterprise

The Encryption At Rest Myth: Why Your Encryption Strategy Fails to Protect Data

Unlocking Mission Success Through Encrypted Data Processing

Data Encryption: Understanding the Often Unseen Vulnerability You Must Avoid

The Case for Continuous Encryption in Healthcare