Reshaping data ownership for the web
Securely unlocking data's full potential through a trustless ecosystem.
We go beyond providing digital trust, into provability
A Next-Gen solutionist ecosystem committed to reshaping data processing, through full encryption and code is law smart contracts. Enabling data holders to create powerful, meaningful intelligence to solve the world's most complex challenges.
Explore untapped potential
Data is one of the world's most valuable assets.
Unlock its full potential with Secretarium.
Secure your data
Protect your sensitive data with full encryption and tamper-proof databases. Overcoming business and regulatory constraints to provide endless opportunities.
Manage your data
Using our technology, networks of people and organisations can collaborate worry-free, while keeping their data safely protected.
Monetise your data
Use a privacy-first data commoditisation strategy to generate revenue streams from sensitive and commercial data without data transfer or disclosure.
Partners & adopters
Business solutions
Connect. Protect. Unlock.
Store
Home to trustless apps built on the platform. Discover apps that redefine data ownership for the web
Enterprise
Unlocking new business opportunities and reducing automation costs through provably secure data collaboration
Identity
Personal data storage and digital identity built into an online wallet
Cloud
Storage for encrypted documents, always keeping data owners in control
The Klave network
Klave
Integrity and privacy engineering made easy.
Bringing open innovation to developers through an easy-to-use network, to build and deploy trustless apps.

Case studies
Built with Secretarium
What makes us unique
Our technology is trustless and privacy-preserving.
Next-Gen distributed ledger technology
Secretarium's Secure-Enclave Distributed Ledger Technology is powered by a Proof-of-Processor consensus mechanism built upon Trusted Execution Environment (TEE) capabilities. This mechanism ensures instant finality and processes orders of magnitude quicker than other consensus mechanisms, while always protecting the confidentiality and integrity of data in memory.
Honest by design
Providing transparency and verifiability at all levels. Remote attestation ensures the code runs in a secure enclave on a fully updated system, with the highest level of security. Apps deployed follow the 'code is law' principle, ensuring that the app's identity, integrity, code and transactions output can be cryptographically checked.
Privacy first
Leveraging confidential computing which lies at the intersection of privacy, cryptography, security and secure hardware to protect the confidentiality and integrity of data.
Data protected in use
Using hardware-based Trusted Execution Environments (TEEs) that prevent unauthorised access or modification of apps and data while in use.
Data protected at rest
Providing tamper-proof ledgers that are fully encrypted by default and leverage on Merkle tries protection to safeguard data at rest.
Data protected in transit
Our connection protocol uses multi-layered Transport Layer Security (TLS) to guarantee a secure and inspection-resistant connection to the TEE.
Recent news

Secretarium announced by the MAS as part of winning solution for their global CBDC challenge
Secretarium announced by the Monetary Authority of Singapore as part of winning solution for their global CBDC challenge. We’re thrilled that our privacy-preserving smart contract technology has been leveraged in a solution that won the global CBDC challenge organised by the Monetary Authority of Singapore.

One step closer to democratising data protection with investment from IQ Capital
We’re excited to announce that we’ve been backed in our seed funding round by transformative deep tech investors IQ Capital. We have been proudly providing our Secure-enclave Distributed Ledger Technology to our customers. We’re confident it has the potential to transform how data is handled around the world, and the time has now come to make it accessible to the masses.

Innovation Award wins for banking reference data applications
Our KYC and AML apps enable secure peer-peer data collaboration. The DANIE group has been using our technology since 2019 to improve data quality. It allows them to securely and anonymously identify data outliers by comparing reference data, without having to reveal it.

Implementing performant scalable solutions in confidential computing
Confidential computing (also known as Trusted Execution Environments or SGX enclaves) is a means to calculate secret information while maintaining confidence that malicious software installed on that machine cannot see or amend those calculations.

An introduction to the Moai app
Privacy preserving epidemic monitoring solutions Moai’s easy-to-use solutions allow health authorities around the world to work together to stop the spread of diseases such as COVID-19.

Privacy and confidentiality of genetic information: from genetic privacy to open consent
Genome sequencing technology has advanced at a rapid pace. It is expected to keep going down dramatically with a $100 whole genome sequencing (WGS) expected in 3-5 years. The benefits of this genomics revolution are potentially enormous, and the biomedical community has certainly remarkably high hopes for such data. That race to harvest the potential of genomics will usher a new era for genetic engineering and genetic screening. Those new threats require new principles, new regulations, and therefore new systems to protect our right to privacy while allowing research to be carried out and enable new precision medicine treatments to be developed.
Recognitions
- Most innovative financial data security solution
- Most innovative use of distributed ledger technology
- Most innovative data privacy by design
- Highly commended solution for front office/trading
- Most innovative buy-side trading workflow / STP