top of page
Perm logo transparent.png

Let's Share Secret
Without Breaking Secrecy

PERM provides data security solution software that will make sensitive data transfer for outsourcing data processing safer, more transparent, and create new opportunities for data analytics.

Our Story

Perm was founded in April 2021 by five university students who have a background in business innovation and engineering. Our team has a passion for creating breakthrough technology that can play a substantial role in increasing data security in today’s data-driven era.

Traditional data transfer presents risks of data exposure and regulatory barriers that existing methods can not completely eliminate. Perm has developed an "encrypted data management tool," software and a library that enables a data controller to encrypt data before sending it to a data processor for machine learning purposes. Where the data processor is able to perform all calculations on encrypted data "without" any need for decryption.

Our Product

Encrypted Data Management Tools & Library

Encrypted data management tools allows data controller to fully utilize Fully Homomorphic Encryption and all the features to increase security, privacy and transparency of data for outsourcing data processing with third-party data processor. Moreover, the code library will be available for data processors to create machine learning models to train on encrypted data, making every step as simple and convenient as possible for all stakeholders.

Product Feature

Encrypt/Decrypt

Key Management

Data Transferring

How Our Product Work

Fully Homomorphic Encryption(FHE) is an encryption scheme that allows computation on encrypted data without requiring decryption and produces the same results as computation on plain-text. Similar to other encryption schemes, the holder of the secret key is the only person who can access the data. Where, the raw data is inaccessible to other parties. After computation, the results will be in encrypted form, which must be decrypted using the secret key to see the actual results. This means that the secret key holder will be acknowledged every time the data is used, preventing any unauthorized use of the data.

Request for Demo

Screen Shot 2565-10-25 at 13.29.01.png
Screen Shot 2565-10-26 at 23.07.02.png
share.jpg

Testimonial 

We have tested our product with Digital Centre of Excellence, Banpu by providing an encryption software for outsourcing data processing purposes

Feedback

"Trial with PERM can help us to increase overall process efficiency when we need to work with high security data (encrypted) and share to external vendor for their analysis result"

Supree Leeratanaruk

Digital Centre of Excellence

Partners

1280px-Amazon_Web_Services_Logo.svg.png
526910fda9d18593d8be.png

Get to know what PERM can do more

Perm logo transparent.png

Contact Us

Thanks for submitting!

bottom of page