- Anti-Piracy
Streamkeeper Cloud Solutions
Full anti-piracy bundle including Counterspy, DRM & more
Studio-grade rights management to securely deliver video
Forensic client and server-side watermarking identification
On Prem Solutions
Studio-approved security for content distribution
Software solution to protect content between devices
Prevent industrial scale content piracy with MovieLabs compliant, studio-approved security.
Streamkeeper Cloud Solutions
Full anti-piracy bundle including Counterspy, DRM & more
Studio-grade rights management to securely deliver video
Forensic client and server-side watermarking identification
On Prem Solutions
Studio-approved security for content distribution
Software solution to protect content between devices
- Threat Defense
App & Client Protection
Secure Android and iOS apps in minutes
Protect app code with customizable security toolkit
Protect cryptographic keys with an engineering toolkit
A free in-depth android application security assessment
Endpoint Defense
Defend against endpoint attacks by monitoring the threat perimeter and preventing apps from being weaponized
Close the open door in your security wall by monitoring unmanaged threats. Protect your apps and devices before they compromise your enterprise.
App & Client Protection
Secure Android and iOS apps in minutes
Protect app code with customizable security toolkit
Protect cryptographic keys with an engineering toolkit
A free in-depth android application security assessment
Endpoint Defense
Defends against endpoint attacks by monitoring apps, APIs and unmanaged devices; illuminating blind spots and preventing firewall intrusions
- Solutions
- Platform
- Pricing
Verimatrix Key Shield
Advanced Engineering Toolkit to Protect Cryptographic Keys



Top Banks Protect their Apps with Key Shield
Exposed cryptographic keys are a known vulnerability in app code. Verimatrix Key Shield effectively dissolves keys into the code itself and obscures algorithms to keep critical applications and data safe – even if a hacker has complete access to the device on which the algorithms are executing. This is why CTOs and chief compliance officers at many of the world’s leading banks use Verimatrix Key Shield to shield their consumer-facing apps from attack.
An Engineering Toolkit for Crypto-Security
The Key Shield Whitebox Designer can be used to generate a unique cryptographic architecture to keep hackers from anticipating how to analyze and attack. The ability to define the optimum whitebox for your needs brings massive performance gains. By chaining algorithms, complex operations can be performed without the need to jump between multiple implementations.

Maintain Exclusive Control of Your Keys
Traditional whitebox vendors provide a pre-compiled library, which means that the vendor “unlocks” the whitebox. If these keys are shared between multiple customers, someone else’s insecure application can put yours at risk. With Verimatrix Key Shield, you always remain in control of your own keys. We never see them, and they can never be shared by other implementations.
Jettison Hardware Security with a Pure Software Approach
Dependency on hardware can be costly and cumbersome, which is why Verimatrix Key Shield operates in a pure software environment without the need for expensive, resistive hardware. With this approach, an application can support any device without any provisioning fees or the hassle of arranging and paying for access needs.
Build Your Custom Cryptographic Architecture
Any Algorithm
Protect any algorithm including AES, AES-GCM, (3)DES, RSA, ECDSA, ECC Key Gen, ECDH, HMAC, SHA, 3DES MAC and AES-MAC.
Any Platform
This flexible security solution empowers you to protect content and data on any platform regardless of device state.
Any Key
Even when running in an exposed environment, Key Shield achieves a secure boundary by dissolving keys and protecting secrets.
End-to-End Support
Our team’s deep experience in app protection streamlines support for implementation, integration, testing, and maintenance.
Software Environment
Operating on a pure software environment, you won’t be held back by the dependencies and costs of resistant hardware.
Customized Security
A unique graphical designer allows you to quickly and easily define your own error-free cryptographic architecture.
Talk to a Key Shield Specialist
See how you can create your own secure cryptographic architectures.