Skip to main content
This section provides a detailed, quarter-wise breakdown of our plans for the upcoming year. It highlights key initiatives, feature releases, and platform improvements we aim to deliver in 2025.
The Roadmap will be constantly reviewed to ensure delivery inline with product development roadmaps.
Completed & Ready
In Progress or Not Started

Secure Secret Storage

  • AES-256 encryption ensures secrets are stored securely.
  • Symmetric Encryption

    Fast and efficient encryption using AES-256, suitable for securing large datasets.

    Asymmetric Encryption

    RSA (2048/4096-bit) and ECC (P-256, P-384) for secure data transmission and digital signatures.

    Secure Secret Storage

  • RSA, ECC certificate chains are stored securely
  • SSH credentials to provide secure and centralized SSH access control for your infrastructure.
  • End-to-end encryption, meaning even Encrova itself cannot access the secrets.
  • Certificate Management

    Enable virtualization for testing in non-production environments

    API & SDK integration

    REST API and SDKs for seamless integration into applications for Symmetric & Asymmetric encryption. It supports Python and Javascript

    Secret Sharing

    Securely share encrypted secrets with authorized users while maintaining strict access control and encryption policies. This ensures that sensitive credentials, such as API keys, database passwords, and encryption keys, are only accessible to the right individuals or systems without compromising security.

    Certificate Management

    Enable virtualization for testing in non-production environments

    Secure Secret Storage - SSH

  • SSH credentials to provide secure and centralized SSH access control for your infrastructure.
  • IAM Integration

    IAM solutions into an application or system to handle authentication, authorization, and user identity management securely.

    Role-Based Access Control (RBAC) & Permissions

    IAM solutions into an application or system to handle authentication, authorization, and user identity management securely.