News & Thought Leadership

Check out the latest news, insights, and updates.

Videos & Podcasts

See and hear more about our capabilities and tech.

Frequently Asked Questions

Uncover answers + common myths and misconceptions.

The Data Triad

Discover why protecting Data in Use is critical.


About Us

Learn our story and meet our team.

Our Partners

Explore our collaborations to advance secure data usage.


We're hiring!
Consider our active openings — Join our team!

Use Cases

We're hiring!
Unlock untapped opportunities across verticals.


Public Sector

Mission-enabling, transformative data usage for federal users.

Financial Services

Secure and private data sharing across silos and jurisdictions.


Securely use and collaboration with sensitive, health-related assets.

Secure AI

Enhance decision making, protect privacy, and combat ML/AI risks.
We've just released an article!
Highlights of tremendous progress in the Privacy Enhancing Technologies market
Book a Demo
April 4, 2024

TechSpective: From Promising to Practical — The Transformative Impact of Homomorphic Encryption

In this article, Enveil CEO Ellison Anne Williams discusses the value Homomorphic Encryption can deliver to private and public sector organizations.


When the impact of a relatively unfamiliar technology sounds too good to be true, it’s natural to question those claims. Homomorphic encryption has been described as the ‘holy grail’ of encryption for its unique ability to allow users to leverage data in the encrypted domain (in ciphertext) the same way they would in an unencrypted manner (in plaintext). In today’s data-driven environment, this ability to use and extract value from data without sacrificing privacy or security is a game changer — so significant in fact that upon first exposure, it is frequently treated with skepticism: if it’s so transformative, why isn’t everyone using it?

To understand the power of homomorphic encryption and where it can (and is) being utilized today, we need to look back and level up. Homomorphic encryption, or HE, has been the subject of academic and corporate research efforts for decades. From the earliest days, the power of the technology was clear; the practicality, however, was another matter entirely. Performing computations using HE once took hours or even days, effectively closing that door for business uses. Continual breakthroughs over the last decade have rewritten the story, enabling HE to be leveraged for a broad range of use cases, some of which we'll highlight later.

Beyond the progression of the technology itself, market drivers such as regulatory and policy advances and the proliferation of global data sources and silos have made the secure and private use of data more critical than ever. Organizations must be able to extract value from data sources across boundaries without increasing risk. This has driven interest and exposure for a family of technologies known as Privacy Enhancing Technologies, grouped together for their ability to preserve, enable, and enhance the privacy and security of data throughout its lifecycle. [...]

To highlight the impact of this technology, let’s explore five key business use cases for HE today:

  • Secure AI: Nothing is more hyped and being pursued more aggressively in the current business climate than Artificial Intelligence and Machine Learning. Bold statements and directives from globally-influential groups including G7 LeadersNCSC, and the White House, have directed organizations considering such initiatives to ensure they do so in a manner that is private and secure. AI is by nature data-hungry; the more relevant data inputs available, the better the outcome of AI/ML efforts. Using HE, organizations can evaluate and train sensitive models over cross-boundary data sources to enrich outcomes. And since the model remains encrypted during processing, company-sensitive information such as the data over which the model was trained is never exposed outside the trusted walls of the organization. This allows ML models to be used in ways that were not previously possible due to regulatory restrictions, data localization requirements, and broader risk considerations.
  • Secure data collaboration across jurisdictions: In today’s global operating environment, organizations must navigate the heterogeneous regulatory landscape, ensuring they abide by data protection laws and localization requirements even across their own data holdings. Using HE, an entity can search and analyze data across jurisdictional boundaries without revealing the sensitive/protected content of the computation itself. This allows the user to extract business-enabling value from the data while remaining in compliance.
  • Secure third-party data usage: Organizations rarely have the fortune of owning all the data they need to achieve competitive advantage or enhance decision-making. Businesses and public sector entities frequently turn to third-party and commercially available data sources to provide specific insights or a broader view of the market. Rather than replicating and pulling these additional data sources into trusted environments for processing or incurring risk by exposing sensitive indicators, HE allows users to search, analyze, and run machine learning models over these disparate data sources without revealing their own interests. Expanding the number of data holdings that can be securely and privately used provides an advantage to businesses that need to make decisions quickly and efficiently.
  • Cross-silo data sharing: Data silos exist even within the walls of an organization. Data may be segmented by department or security boundaries, such as ‘need to know’ restrictions in the public sector arena. By utilizing HE to encrypt searches and analytics, businesses can draw out insights from cross-silo datasets in a secure and private way — protecting the content of the interaction while respecting the security and ownership of the underlying data.
  • Secure inter-organizational collaboration: In order to achieve big-picture objectives, businesses sometimes need to share data and collaborate with unexpected entities, including those with competitive interests. Think, for example, about the drug development process where multiple parties need to be able to use datasets owned by academic or public institutions to advance their efforts and the greater good. In another example, a consortium of competing entities, such as financial service institutions, may want to share data to help combat a shared global threat such as money laundering. Utilizing the power of HE, these groups can collaborate without compromising Intellectual Property of competitive advantage, opening the door to new, more efficient paths to progress.

Homomorphic encryption is only beginning to show its value for business and government organizations. The technology’s unique ability to protect data while it’s being utilized has the potential to shift the way we use data on a broad scale by expanding the field of usable data sources and ensuring privacy and security are prioritized whenever and wherever data is leveraged. As a foundational pillar of the Privacy Enhancing Technology family, HE is nearing its breakout moment. Business leaders who want to be ahead of the privacy and security curve need to pay close attention.

Read full TechSpective article here.

TechSpective homomorphic encryption
To learn more about the expanded value unlocked by Enveil, please schedule a meeting.
Enveil Logo
Enveil is a pioneering Privacy Enhancing Technology company protecting Data in Use. Enveil’s business-enabling and privacy-preserving capabilities change the paradigm of how and where organizations can leverage data to unlock value. Defining the transformative category of Privacy Enhancing Technologies (PETs), Enveil’s award-winning ZeroReveal® solutions for secure data usage, collaboration, monetization, and Secure AI protect the content of the search, analytic, or model while it's being used or processed. Customers can extract insights, cross-match, search, analyze, and leverage AI across boundaries and silos at scale without exposing their interests and intent or compromising the security or ownership of the underlying data. A World Economic Forum Technology Pioneer and Gartner Cool Vendor, Enveil is deployed and operational today, revolutionizing data usage in the global marketplace.
Copyright © 2024 Enveil | Privacy Policy