Protected by H33 post-quantum encryption

Security is not a feature.
It's the foundation.

NoSheet encrypts your sensitive data at the cell level using H33 post-quantum cryptography. PII is protected before it ever touches a database — even we can't read it.

🛡

SOC 2

Type II controls implemented and audited

🌐

GDPR

Automated consent, right-to-delete, data portability

📋

ISO 27001

12 ISMS controls built into the core

🔐

Post-Quantum

H33 BFV FHE + Dilithium signatures

🔐Encryption

Cell-Level Encryption

Every PII column is encrypted using Fully Homomorphic Encryption (FHE) before it ever reaches the database. Not row-level. Not table-level. Cell-level.

  • PII is encrypted before it touches the database — not after
  • Keyword tags enable search without decrypting sensitive values
  • Per-tenant encryption keys wrapped by a master key
  • Phase 2 upgrades to BFV Fully Homomorphic Encryption (FHE)
  • Even NoSheet engineers cannot read your encrypted data
  • Decryption keys never leave the secure enclave
database row

What you see in NoSheet

Name

Jane Smith

Phone

+1 (555) 867-5309

Email

jane@example.com

SSN

***-**-4589

What's stored in the database

// PII columns encrypted at rest
{
"name": "Jane Smith",
"phone": {
"__encrypted": true,
"ct": "a3f8b2c1...e9d4",
"v": 1
},
"email": {
"__encrypted": true,
"ct": "7b1d9e3f...c2a8",
"v": 1,
"tags": ["@example.com"]
},
"ssn": {
"__encrypted": true,
"ct": "f4e2a1b9...d7c3",
"v": 1
}
}
🛡Compliance

12 ISMS Controls, Built In

A full Information Security Management System implemented in Rust. Not bolted on as middleware — baked into the core.

👤

RBAC

Fine-grained role-based access at workspace, sheet, and cell level.

🔍

DLP

Automatic data loss prevention scanning for SSN, CC, phone, and email patterns.

🌐

GDPR

Automated right-to-delete, data portability export, and processing records.

Consent Management

Track and enforce consent per contact with timestamped opt-in records.

📝

Audit Trail

Tamper-proof hash-chain log of every data access, edit, and export.

🔄

Change Tracking

Complete version history with diff view and instant rollback.

🚨

Incident Response

Automated breach detection, notification workflows, and containment.

🚫

Zero Trust

Every request authenticated and authorized. No implicit trust, no shared sessions.

Session Management

Configurable timeouts, concurrent session limits, and forced re-auth.

🖥

IP Whitelisting

Restrict access to specific IP ranges for enterprise deployments.

🔑

Key Management

Per-tenant keys with automated rotation, wrapped by HSM-backed master key.

📊

Compliance Frameworks

SOC 2 Type II, GDPR, HIPAA-ready, and ISO 27001 alignment.

🔍Data Protection

DLP Scanning & Tamper-Proof Audit Trail

Sensitive data is automatically detected, quarantined, and optionally redacted before it can spread. Every change is recorded in a tamper-proof hash chain.

  • Auto-detect SSN, credit card, email, and phone number patterns
  • Quarantine flagged cells before they can be shared or exported
  • Optional auto-redaction with configurable replacement tokens
  • Hash-chain audit trail — every entry references the previous hash
  • Tamper detection: if any entry is modified, the chain breaks
  • Export full audit log for compliance reviews and incident response
DLP Scanner
💳

Credit Card Detected

Cell D7 — Visa ending 4242

Quarantined
🆔

SSN Pattern

Cell C14 — XXX-XX-XXXX format

Quarantined

Email (PII)

Column E — 2,847 email addresses

Encrypted

Phone Numbers

Column B — 2,535 phone numbers

Encrypted
// Hash-chain audit entry
{
"action": "dlp.quarantine",
"cell": "C14",
"pattern": "SSN",
"prev_hash": "8a3f1b...",
"hash": "c7e2d9..."
}
⚙️Infrastructure

Built for Security at Every Layer

From the language we chose to the way we sign webhooks, security informed every architectural decision.

🦀

Rust Backend

Memory-safe, zero garbage collection pauses, no buffer overflows. The entire ISMS suite runs in compiled Rust.

🗄

Tenant Isolation

PostgreSQL with strict tenant isolation. Row-level security policies ensure no cross-tenant data leaks.

Encrypted at Rest

S3 storage with AES-256 server-side encryption. All backups encrypted and geo-replicated.

🔗

HMAC-Signed Webhooks

Every outbound webhook is signed with HMAC-SHA256. Built-in SSRF protection prevents internal network access.

Constant-Time Comparison

All signature verification uses constant-time comparison to prevent timing side-channel attacks.

🔒

TLS Everywhere

All data in transit encrypted with TLS 1.3. HSTS enforced. Certificate pinning for API clients.

Comparison

How We're Different

Most spreadsheet tools treat security as an afterthought. We built it into the foundation.

Security DimensionNoSheetGoogle SheetsExcelAirtable
Cell-Level Encryption
Post-Quantum Cryptography
DLP Scanning
GDPR AutomationManualPartial
Tamper-Proof Audit TrailVersion historyTrack changesBasic log
Zero Trust Architecture
RBAC (Cell Level)Sheet levelFile levelTable level
Consent Management
AI Data CleaningMacros onlyLimited
Built-in Campaign Engine

Start building on a secure foundation.

Post-quantum encryption, DLP scanning, ISMS compliance, and a tamper-proof audit trail. Free to start. No credit card required.