company_logo

JumpWire Company Information

JumpWire, based in New York with a fully remote team of two, operates within the B2B security sub-industry. As a participant in the Y-Combinator W22 batch, the company focuses on enhancing data security across the United States and Canada. JumpWire provides a suite of security features including dynamic access controls, database field encryption/tokenization, and geo-replicated query routing. It also allows for the blocking of specific data from HTTP egress and is designed for easy deployment within private networks using a company’s own cloud infrastructure.

The company’s technology adapts to existing infrastructure architectures and can be deployed as either an HTTP Proxy or Database Proxy. Its integration platform manages connections between APIs and databases, ensuring automated scalability. JumpWire supports self-hosting with AWS ECS and Helm and includes a CLI for management. It offers encryption key stores and allows for encryption format customization. The architecture is designed to efficiently distribute work across a cluster of nodes, adding advanced data security controls between APIs, applications, and databases. It automatically identifies sensitive properties within large data sets and enables developers to control access to records containing sensitive information, thereby minimizing the risk of data leaks.

JumpWire supports compliance with major standards such as SOC, HIPAA, and GDPR. Unique in its approach, the software is installed directly within customers’ own infrastructure and clouds, interoperable with existing applications and databases without requiring large data migrations or code refactoring. It offers features like data access approvals, encryption, and audit logs, and operates entirely within the customer’s environment, eliminating the need for third-party vaults or enclaves. As a free and open-source software, JumpWire can be deployed in just two minutes without code changes, external libraries, or third-party data stores, and is designed for defense-in-depth data security, preventing sensitive data from being leaked or exposed in various scenarios including backups, logs, and data exports.

Still processing data for company.

2 people indexed:

No searches found for this company.

Unlock exclusive insights

Sign up to reveal more information.

Sign up for free