Skip to content
ShardSecure: Microshard Secure Implementation & Audit Guide

This document is designed to aid security implementers to securely plan a Microshard deployment, as well as auditors in assessing risk and compliance with data secured by Microshard technology. There are unique concepts and considerations when auditing Microsharded data, and careful considerations to take into account when deploying Microshard Technology in your environment. As with all security tools, the details matter.