Our story

From PKI Consulting Experts to Leaders in the Data Protection Space, we are laser-focused on securing your sensitive data

Encryption Consulting is an established data protection consulting market leader and has observed exponential growth since its inception. More than 100 corporations of the Fortune 500 have sought our help in protecting their sensitive data and solving the most complex problems. We are armed with a team of dedicated and deeply committed experts who work shoulder to shoulder with clients to enhance their data security posture and capabilities. Through our products and professional services, you will be able to strengthen your ability to protect cryptographic keys, digital certificates, software code, and much more.

Our Vision

Customer Success

We encourage them to accomplish exceptional feats as a result. In order to give all of our stakeholders new opportunities to experience ever-greater success, we innovate and broaden our business offers.


Everyone should, in our opinion, be heard, valued, and given the tools they need to succeed. Hearing different points of view encourages innovation, strengthens interpersonal relationships, and improves our organisation.


We create products that best meet the demands of our customers’ businesses thanks to their feedback. Giving our customers ongoing technological releases and new initiatives provides them a competitive edge.

Our areas of expertise include:

  • Public Key Infrastructure
  • Enterprise key management
  • Cloud Key Management
  • Code-signing
  • Hardware security modules
  • Transparent data encryption
  • Element level format preserving encryption
  • Homomorphic encryption, and tokenization
Advisory Board Member

Brian Komar

Advisory Board Member

Brian has been involved in Microsoft PKI since the beta testing of Windows Server 2003.

He worked as a contractor on the product team at Microsoft during the development of Windows Server 2003 PKI, authoring several whitepapers on the technology.

In addition, he has authored two books, several whitepapers and a course on Microsoft PKI.

CTO for Products, Venafi

Paul Turner

Advisory Board Member

Paul Turner first worked in PKI at CertCo from 1996 to 1998. He was the CTO of Products at Venafi, where he worked from 2004 to 2018. During his time at Venafi, he worked extensively with Global 1000 and government organizations to provide solutions for certificate and key management. He played an instrumental role in Venafi’s product strategy.

He has worked closely with NIST to establish clear, implementable guidance for certificate and key management, including co-authoring and providing feedback on NIST SP 1800-16, NIST IR 7966, NIST IR July 2012, and SP 800-57 Parts 1 and 2.

The Problems we solve

Our specialty is delivering Assessments, Strategies, and Implementations for organizations who either lack specialized resources or who simply value having a trusted advisor to assist them in upgrading their data security posture.

At Encryption Consulting, we have created a custom framework based on NIST 800-57, NIST 800-53 standards, FIPS and industry best practices to accelerate our client’s data protection projects.

Microsoft Azure Data Protection Implementation

Business drivers of Encryption Adoption

Comply with industry regulations such as GDPR, PCI-DSS, NYDFS, HIPAA, etc

Reduce serious business risk and protect assets

  • Intellectual Property (IP)
  • PII information
  • Company’s Reputation
  • Business’s Brand

Defend against a costly data breach

  • Gaps in protection are measurable
  • Exposure increases as policy & process become dated
  • Hackers are more sophisticated than ever

In summary, we enable organizations to identify areas in their current encryption environment needing improvement by conducting as assessment, creating a roadmap, and implementing an encryption plan end-to-end.

Areas where our clients have requested our help

  • Sensitive Data Identification and Classification
  • Enforcement of data protection controls – Encryption, Tokenization, or Masking
  • Expert advice on implementation strategy and services
  • How to comply with encryption standards and follow industry best practices
  • Insights on encryption compliance & regulation
  • Operationalizing Encryption key lifecycle management
  • Delivering on reporting and integration
  • PKI and HSM training for cloud and on-premise environments
  • Encryption technology supplier evaluations
Encryption Assessment Strategic Objectives

Let's talk