End-to-End Encryption
How to keep your data between just you and your end-usersTranscend is the only data privacy partner that can reduce your breach risk rather than add to it. From end-to-end encryption, to single sign-on (SSO) on every plan, Transcend is designed from the ground up with robust security controls.
Learn how to deploy Sombra, our self-hosted security gateway, and configure additional features that help your company eliminate operational risk.
Sombra Overview
Sombra is an end-to-end encryption gateway that secures your data.
Self-Hosting Sombra
Benefit from full end-to-end encryption of customer data
Sombra Self-Hosting Costs
Understand the estimated costs associated with self-hosting a Sombra gateway
Sombra on Kubernetes
Deploy your Sombra instance into a Kubernetes environment.
Sombra LLM Classifier
Deploy the LLM Classifier with your Sombra instance into a Kubernetes environment
IP Allowlisting
Lock down the IPs that can connect to your self-hosted Sombra
AWS PrivateLink Communication
Have Sombra <-> Transcend traffic take place over AWS PrivateLink
Tunnel from Transcend to your Private Database
Have Transcend Hosted Sombra connect to your private database using AWS PrivateLink.
Rotating Sombra Keys
How to rotate your encryption keys in Sombra
HashiCorp Vault Secret Fetching
Keep environment variables safe with dynamic environment variable fetching