Learn how to securely store device profiles that can be used to authenticate to Ionic, and how to implement your own custom method for persisting profiles.
Tag Archives: developer
Learn how to encrypt data and apply attribute based access controls to protect data at a granular level wherever it travels. Get started using Ionic SDKs.
Bill’s deep engineering background helps him focus on making customers, partners, and developers successful at integrating with Ionic. I caught up with Bill to learn about the other start-ups he’s scaled, his passion for simplicity, and to get a few surfing tips.
Ionic Encrypted Search (IonES) system is a lightweight and scalable multi-user searchable encryption solution that enables users to search and retrieve protected documents in a provably secure way. Sign up for a private beta today.
Ionic Data Trust Services for Cloud Storage, with coverage for AWS S3 and GCS, today announced preview capabilities for Azure. This brings Ionic’s machine-scale encryption, policy orchestration, and visibility across the three major CSPs.
Overseeing business development, sales, marketing, and legal, Robert is a true road warrior. I caught up with Robert late one afternoon to delve into his background in scaling major successes like Akamai. Robert also dedicates time to organizations who develop privacy regulations and policies, which is so relevant to Ionic’s mission of data protection.
Darrell takes a balanced approach to assessing new technology; he’s inspired but practical in the search for effective and manageable solutions. I caught up with Darrell to learn more about his connections to other Ionic leaders, his approaches to scaling an organization, and his passion for sports.
Rick, Developer Advocate at Ionic, gets an application running with our SDK and weighs in on important questions like tabs vs. spaces.
Ionic Security uses publicly available libraries to implement some of its cryptographic primitives, such as elliptic curve scalar multiplication. For this reason, Ionic is careful to distinguish between trusted and trustworthy libraries. To illustrate the difference between…