GDPR compliant

GDPR recommends using encryption method to protect sensitive information.

Protect sensitive data

Protect your business by encrypting any sensitive information.

Easy to use is modern and easy-to-use for non-technical people.

Battle tested is used by national mobile carriers to de-identify extremely sensitive and personally identifiable information.
The tool has been thoroughly reviewed and approved by a corporate security and data privacy officers.

Czech Republic a.s.
Cisco - TeskaLabs's Mobile App Security Technology
Microsoft UK BizSpark Plus Program
Tomas Budnik
CEO & Chairman of the Board, O2 Czech Republic
We use TeskaLabs’ technology
in O2 Czech Republic in several key areas.
Vlad Toma
IT manager, Prodvinalco is safe and easy to use. For us, it's important that the tool is simple because it is used by non-technical people. I'm very satisfied with the product.
Marek Beniak
CTO, Heureka
Even though they work for big companies we were able to establish personal cooperation without hassle. TeskaLabs guides us through secure and scalable mobile app development.

How it works

1. Connect local file system or cloud file system

2. Select file or folder with sensitive information

3. Press Encrypt to encrypt the files or folder

4. Press Decrypt to decrypt the files or folder

See Encryption in action (video) is safe and easy to use. For us it's important that the tool is simple, because it is used by non-technical people. I'm very satisfied with the product. – Vlad Toma, IT manager, Prodvinalco



Contact us

Leave your contact information and a sales representative will contact you shortly.

Or, call us directly at +44 (0) 7548 674986 (United Kingdom)

* Required
We promise we will never share this with anyone!

We guarantee that your email and other personal information are confidential and will not be sold or rented.

Product information

Use cases


File format

PDF, CSV, Microsoft Office (XLS, PPT, DOC, DOCX, DOCM), Libreoffice, Google docs, txt, zip, jar, PNG, gif, DB, AI, SVG, HTML, mp3, mp4, MPEG etc.

File system connectors

Local file systems (Linux, Windows, Mac)
Cloud file storages (e.g. Google Drive, Dropbox)
Private cloud file systems

Deployment options

Public cloud (AWS, Azure, Google Cloud, …)
Private cloud

Cryptographic hardware

HSM compatibility
TPM compatibility
PKCS#11 / OpenSSL / OpenSC API

Key rotations


Encryption algorithms

AES-512, AES-256, AES-128
RSA (4096 bit or equivalent)

User Interface

Optional web UI (via web browser)

Real-time processing


Modes of operations

Fully autonomous

Hardware requirements (typical)

2 CPU cores, x86-64, 4GB RAM, HDD 20GB

High Availability

Yes, supported.

Software requirements

OS Linux Red Hat, CentOS, Ubuntu
Containers: Docker, LXC, Kubernetes (optionally)

LDAP support (e.g. Active Directory)



What will happen after I request a free trial?

Firstly, we will ask you to provide us with your contact information. After submitting your contact information,'s representative will contact you within 24 hours to schedule a Skype/WebEx call. On this Skype/WebEx call we will provide you with the software and assist with the implementation. After the tool is implemented, you can start using it right away. The trial period is 14 days.

How can I buy

The best way to buy is to contact us via a contact form above. After submitting your contact information,'s sales representative will contact you within 24 hours with an official proposal. After signing the proposal, we will send you an invoice, and we will schedule an implementation workshop where we will assist you with the implementation of After the tool is implemented, you can start using it right away.

Who does the implementation?

Our team of experts is ready to do the implementation for you. In case you want to do the implementation on your own you can do it as well. In that case, we will provide you with software and guidelines on how to implement it.

Does store any data?

No, de-identifies data “on the fly” in realtime because it is a stream processor. There is no data storing within the tool.

Are there training courses that are necessary to use the tool?

We provide trainings for the However the tool is typically deployed in a very simple way, therefore no specific training is required.

Use cases

Data Encryption for GDPR

Data encryption is a critical part of GDPR compliance although there are no explicit GDPR encryption requirements. The regulation vaguely states that businesses must enforce safeguards and security measures to protect all consumer data that they handle. The GDPR refers to pseudonymization and encryption as “appropriate technical and organizational measures."

Encryption is a very powerful security technique that converts or encodes messages and information into unintelligible form. It does so in a way that allows only authorized parties to access it. Unauthorized parties cannot access encrypted data. Data is encrypted using software that utilizes one or more cryptographic keys. Each key is made up of a string of random characters, like letters and numbers. A key converts (encrypts) the original plaintext data into encrypted ciphertext format.

Ciphertext format is secure because it can only be read once decrypted. The encryption keys can be used to convert and decrypt cipher text back into human readable plaintext data. Since this encryption process renders a set of information unreadable and, therefore, unusable to anyone who does not have a valid cryptographic key, GDPR encryption techniques can prove very beneficial to your company if a data breach is ever to occur.

The GDPR has set a strict requirement that all organizations must notify people in the event of a data breach within just 72 hours. If you encrypt your data, however, you will not have to comply with this requirement since any "leaked data" will be totally unusable and unreadable to any unauthorized individuals who view it. The reason is simple: if the data is unintelligible outside of your organization, no information has truly been leaked.

In conclusion, data encryption can prove to be highly effective for keeping your organization in GDPR compliance in combination with other measures. Data encryption can help you avoid harmful data breaches alongside expensive noncompliance fines and penalties.

Encrypt sensitive data in archives and backups

One of the targets of the cyber attacker are archives and backups because they contain the same valuable data as the production database, but they are usually much less protected. For this reason, the privacy protection regulation requires deletion of a person from all archives and backups. This is a very tedious and costly task to implement.

Risk: The cyber attacker steals files with the production database archives. The attacker then extracts all Sensitive Personal Information (SPI) from these archives and publishes the data on the internet or darknet. This has resulted in a so-called data breach and the company is liable under GDPR.

Protection: Applying encryption, anonymization, and pseudonymization to all archives and backups will prevent the attacker from extracting sensitive data from the stolen archive.

Breach example: In 2012, TD Bank misplaced computer backup tapes containing personally identifiable information for 267,000 customers. TD Bank later paid an $850,000 fine for this data breach.
Source: Bank Info Security