The Judo platform uses two well-established security concepts: controlling the data lifecycle and defense-in-depth. Judo encrypts your data twice. The platform uses a patented digital “wrapper” system – an inner layer of encryption protects your data, while an outer layer of encryption enforces your policies. Judo’s cryptosharding ensures that your encryption keys neither reside intact on any disk, nor transit the network intact. You’ll have a full, auditable access log, variable access permissions, and verifiable destruction of every copy — wherever it may exist.