Building the Future of Secure Operations

SplitSecure is more than a PAM and more than a Vault. We help organizations protect actions instead of access, frictionlessly integrate security into their operations, and become compliant-by-default. We enforce multi-party approval for high-risk operations like moving funds or modifying infrastructure.
Illustration of a smartphone with a password field showing hidden characters, symbolizing stolen or reused credentials.

Secrets are Liabilities

Every stored secret and credential is a liability for the enterprise, potentially subject to theft and abuse.
Illustration of a desktop computer with a warning triangle and exclamation mark, representing phishing attacks and malicious links.

Distributed Trust

SplitSecure splits trust across multiple individuals and devices, eliminating the need for persistent secrets. SplitSecure is the key to your keyring; the tool that protects your other tools.
Illustration of a laptop, tablet, and smartphone together, symbolizing lost or hacked devices creating security risks.

Designed for the Real World

Easy to use, easy to deploy, and built to satisfy regulatory and operational requirements, so good security never has to slow your team down.

Our Team

Built by security veterans.

Our team has spent over a decade building secure features for some of the most demanding organizations in the world — from the FBI and CIA to Netflix and Google. Now, we’re bringing that expertise to enterprise security.
Tristan Morris

Tristan Morris

CEO, former Product Manager at Samsung KNOX, Cruise
Marc Tremblay

Marc Tremblay

CTO, former staff security engineer at Netflix and Jump Trading.
Sudhi Herle

Raj Yavatkar

Advisor, former CTO of Juniper Networks.
Raj Yavatkar

Sanjay Gosalia

Advisor, ex Google, GS, SVB, Capital One

Our mission

We're here to eliminate security breaches caused by credential theft or abuse — 41% of all cybercrime worldwide.

How it works

A Cryptographic Foundation Trusted for Decades

With SplitSecure, no single person or device ever persists critical information. Credentials and other secrets are never exposed, even during use. All use of protected information and systems is audit logged.
Icon of bank

Enforces multi-party approval at the cryptographic level

Icon of bank

Ensures no single actor can execute high-risk actions alone

Icon of bank

Produces tamperproof logs for audits and compliance

Backed by leading programs and investors.

We’re proud to be supported by top accelerators and investment partners who believe in our mission to transform enterprise security.
Cowboy VC logo
Twelve Below logo

Security compliance

Committed to the highest standards of security.

We’re actively seeking the following industry-recognized security certifications:
FIPS badgeISO 27001 BadgeSOC 2 BadgeCommon Criteria BadgeGDPR BadgeISO 27017 Badge

Ready to see SplitSecure in action?

No jargon. No friction. Just stronger security for your organization.
Book a Demo