End-to-end encryption
How to keep your data between just you and your end-users.Transcend is the only data privacy partner that can reduce your breach risk rather than add to it. From end-to-end encryption, to single sign-on (SSO) on every plan, Transcend is designed from the ground up with robust security controls.
Learn how to deploy Sombra, our self-hosted security gateway, and configure additional features that help your company eliminate operational risk.
Sombra
Sombra is an end-to-end encryption gateway that secures your data.
Self-hosting Sombra
Benefit from full end-to-end encryption of customer data
Sombra on Kubernetes
Deploy your Sombra instance into a Kubernetes environment.
LLM Classifier on Kubernetes
Deploy the LLM Classifier with your Sombra instance into a Kubernetes environment.
IP Allowlisting
Lock down the IPs that can connect to your self-hosted Sombra
AWS PrivateLink Communication
Have Sombra <-> Transcend traffic take place over AWS PrivateLink
Sombra key-rotations
How to rotate your encryption keys in Sombra.
Hashicorp Vault Secret Fetching
Keep env vars safe with dynamic environment variable fetching