Testenium Online Meta-computing Platform for generating code for Encryption & Test Automation
Excel

Encryption Using

EXCEL

Tamil

Encryption Using

TAMIL

Personal and sensitive data held by organisations, large and small, public and private, is under constant threat. In the UK, companies that collect and process personal data are regulated by the Information Commissioner’s Office (ICO), who enforces the Data Protection Act 2018 and the EU General Data Protection Regulations (GDPR). All countries are tightening rules for protecting data.

“Personal data” and “sensitive personal data” are within the GDPR. “Personal data” is a complex category of information, meaning, broadly, information which can be used to identify a person, for this example, his name, address or IP address. “Sensitive personal information” includes, for example genetic data, and information about religious and political views and sexual orientation. Pseudonymised personal data is now included.

It is the duty of data controllers and processors to implement technical and organisational measures proportionate to the threats to the data, and the risks involved in the nature, scope and context of processing. The costs of protection must be balanced against the potential damage to data, and the penalties regulators might impose for beaches of the law. Controllers and processors must be aware of the importance of pseudonymisation and the encryption of data. They must maintain: (1) systems to protect the integrity availability and integrity of processing procedures and service; and (2) mechanisms which ensure the regular testing and evaluation of these systems and their efficiency.

Our platform provides for encrypting companies’ databases and makes the encrypted data searchable using Homomorphic and AES encryption schemes. The data is displayed on the user interface. The plain data is not accessible by third parties because data is encrypted before it is sent to the cloud or local database. While encrypted, it is searchable and can be computed or processed. The encrypted result is sent back to the user, and is decrypted before its corresponding plain data is displayed on the user interface. The plain data is protected from hackers and other outsiders.



Contact Us

Name
Email
Phone
Request for    DEMO      QUOTE      FREE TRAINING
Message








Users can encrypt and store any type of documents in the Cloud using Testenium. Testenium provides a feature to encrypt, store and manage any type of confidential documents and images in the Cloud. Users can download a 'encryptor client' and 'decryptor client', should documents need to be encrypted at the local machine before uploading them.




The CEO of testenium invented the world's first meta-programming language called TAMIL to generate code for Searchable Encrypted Database Application within a second


Testenium generates code for Searchable Encrypted Database Aplications within a second when a data model is provided in TAMIL script on the user interface and submitted to the Testenium Cloud Server.


A one-to-many relationship is defined by providing table name 'Employee' and a field name 'id' in the Salaries table.

Data model can be uploaded in Excel to generate code for Searchable Encrypted Database Application within a second

Testenium generates code for Searchable Encrypted Database Aplications within a second when a data model is provided in EXCEL and uploaded to the Testenium Cloud Server. For example; in order to create a secure and robust Hospital's Patients' management system you can define the data model shown on three excel sheets. Microsoft Excel has a limitation of up to 255 sheets. This is the reason why our CEO invented the TAMIL language which allows the user to define unlimited number of table in a data model for any large application of any industry.


A one-to-many relationship is defined by providing table name, patients in the References column and a field 'NHS_number' in the Linked Field in the 'Patient_Records' table.