SplitSecure is more than a PAM and more than a Vault. We help organizations protect actions instead of access, frictionlessly integrate security into their operations, and become compliant-by-default. We enforce multi-party approval for high-risk operations like moving funds or modifying infrastructure.
Secrets are Liabilities
Every stored secret and credential is a liability for the enterprise, potentially subject to theft and abuse.
Distributed Trust
SplitSecure splits trust across multiple individuals and devices, eliminating the need for persistent secrets. SplitSecure is the key to your keyring; the tool that protects your other tools.
Designed for the Real World
Easy to use, easy to deploy, and built to satisfy regulatory and operational requirements, so good security never has to slow your team down.
Our Team
Built by security veterans.
Our team has spent over a decade building secure features for some of the most demanding organizations in the world — from the FBI and CIA to Netflix and Google. Now, we’re bringing that expertise to enterprise security.
Tristan Morris
CEO, former Product Manager at Samsung KNOX, Cruise
Marc Tremblay
CTO, former staff security engineer at Netflix and Jump Trading.
Raj Yavatkar
Advisor, former CTO of Juniper Networks.
Sanjay Gosalia
Advisor, ex Google, GS, SVB, Capital One
Our mission
We're here to eliminate security breaches caused by credential theft or abuse — 41% of all cybercrime worldwide.
How it works
A Cryptographic Foundation Trusted for Decades
With SplitSecure, no single person or device ever persists critical information. Credentials and other secrets are never exposed, even during use. All use of protected information and systems is audit logged.
Enforces multi-party approval at the cryptographic level
Ensures no single actor can execute high-risk actions alone
Produces tamperproof logs for audits and compliance
Who SplitSecure is Built For
Where Our Technology Makes the Biggest Impact
Our customers use the platform to protect the actions that matter most. Explore how it applies in your environment: