Enjoy free Health Check Reports and volume discounts with DataTools Seltaris+.

data protection icon 1

Advanced Data Protection

Enterprise grade security.
Built from the ground up.

Your business is nobody else’s. Not even DataTools.

advance data protection 1
Bulletproof Security 4

Encrypted
Cloud Computing™

Our most advanced cloud security architecture specifically built with enterprise in mind.

encrypted cloud computing 2
grid bold 3
grid bold 3

Encrypted Cloud Computing™

Cloud security at its highest.
Protections at its tightest.

DataTools has spent nearly three decades pushing the boundaries of what it means to turn your data quality from good to your greatest business asset. Always with an unwavering commitment to security, reliability, simplicity and unlimited support. As organisations rely on DataTools Seltaris to process massive address datasets in record time, they also trust us with some of their most sensitive information.

We achieved this once with the launch of DataTools Kleber in the Cloud, but we weren’t content to stop there. We set out to push these boundaries even further — with a goal to handle larger batch files securely with groundbreaking speed and performance.
data protection icon 1

 

 

That led us to revisit our existing security stack and integrate additional layers for higher volume workloads. An innovative cloud security architecture purpose-built to process batch data securely at the scale today’s largest enterprises demand. We call it Encrypted Cloud Computing™.

Encrypted Cloud Computing™ builds on DataTools’ robust, industry-leading cloud security, now taken to a whole new scale. It ensures that even the most intensive batch jobs run with airtight protections. Your data remains confidential, heavily encrypted, and not accessible to anyone — not even DataTools.

advance data protection 2

Why we built it

Competing cloud environments, while convenient, pose familiar risks. Once data is inside competing cloud platforms, enforcing zero-access guarantees becomes challenging. Logging systems, privileged support consoles, and broad administrative access can inadvertently expose data or leave it vulnerable during operational troubleshooting.

That’s not acceptable for your businesses highly sensitive data. With Encrypted Cloud Computing™, we’ve taken a ground-up approach to cloud security that mirrors — and even surpasses — the standards we’ve long upheld with cloud and on-premise processing.

How it works with
DataTools Seltaris.

DataTools Seltaris is meticulously designed to protect your data at every step. Integrated into the core of our secure cloud environment, it utilises advanced encryption processes to handle your data without ever storing it unencrypted.

Thanks to DataTools Encrypted Cloud Computing™, we can securely process complex requests, ensuring that only you have access to your data. Your information remains encrypted during transit, throughout processing, and at rest, providing next-level security and peace of mind.

seltaris steps 6
1

Before your Batch Process 

Before your batch process begins, DataTools will provide you with a unique client secret key. This key is accessible only to you, the user; no one else, not even DataTools staff, has access to this key. It is crucial to save this key securely, as it is the only means to access your file at the end of the job. 

seltaris steps
2

From the Client on Up 

Once you begin the job, your data file (source file) is encrypted and transmitted from your client PC to our secure cloud environment via HTTPS, ensuring it remains protected during transit.

seltaris steps 1
3

Data Uploading via DataTools Encryption Service

Once the initial records of your file enter our secure cloud environment, we begin importing the stream through our encryption service. This service is designed to encrypt each record individually, line by line, as it is being uploaded. 
seltaris steps 2
4

DataTools Secure Cloud Repository

After a record is encrypted, it is then transferred to our secure cloud repository. This continuous, record-by-record transfer ensures that the file is built up in the repository in real-time, without waiting for the entire upload to be completed. When the source file is fully present in our secure cloud repository, it is encrypted using an ephemeral key obtained from our identity server. This ephemeral key, along with the file, is designed to last only as long as the job. 
seltaris steps 3
5

The Splits

When the source file is fully loaded in our secure cloud repository, it is then split into multiple mini-encrypted files. These mini-encrypted files are designed to improve load times and processing efficiency while still remaining secure. 
seltaris steps 4
6

Time for Processing. The DataTools Altraservice

At lightning speeds, each file is sent to our DataTools Altraservice. This high-performance service decrypts each mini-encrypted file and processes its contents line by line in memory. Utilizing DataTools Human Touch technology, it validates and repairs each record. Once processing is complete, the record is re-encrypted and returned to the secure cloud repository. 
seltaris steps 5
7

Secure Key Management

Temporary client keys are requested and managed through a secure identity server. These keys are used for decrypting and processing data segments without ever storing the decrypted data. As soon as the processing job is finished, these temporary keys are erased, ensuring that only your client key can access the final result file. 
seltaris steps 6
8

File Merging and Result Delivery

After processing, the encrypted segments are merged back into a result file. This result file is at rest for a limited retention window in our secure cloud environment, still encrypted, ensuring complete data security throughout the process. Only you, the client, have the key to decrypt and access the final result file during this window. 

Governance

Government
Bulletproof Security 4

Private Keys

The single key to your encrypted result file.

private keys
grid bold 3
grid bold 3
Private Keys
Own private keys.
Control who sees.
A private key is your unique security credential, issued only to you, and it’s the one and only way to unlock your final result file. When you begin a batch job, DataTools generates a client secret key that is never shared, stored, or accessible by anyone else — not even DataTools staff. From that point forward, every stage of your job relies on temporary, ephemeral keys managed through our secure identity servers. These working keys are used solely for in-memory processing and are destroyed the moment the job is complete. What remains is your encrypted result file, locked and waiting. Only your private key can decrypt it. This design eliminates one of the biggest risks in traditional cloud environments: server-side access. On conventional servers, decrypted data can exist at rest, meaning administrators or third parties could potentially access your information.
data protection icon 1

 

By giving you sole control of your private key, Advanced data protection guarantees:

  • Absolute ownership — You decide who can access your results.
  • Enterprise grade security — Protections and security credentials specifically designed for the strictest compliance environments.
  • Retention period — Once the retention period expires, the encrypted file is permanently erased from our severs.

With DataTools, there are no backdoors, no hidden access points, and no way for anyone else to step between you and your data. Even under force, DataTools cannot hand over what it cannot see.

Bulletproof Security™.
That’s DataTools.

Whenever data is involved, 
security is rightly a concern.

bullet proof security 1
grid bold 3
grid bold 3

Core Features

Explore the core features of DataTools Seltaris
human touch icon 1

DataTools Human Touch™

The tool is innovative.

The experience is magical.

At the core of DataTools Seltaris lies our intuitive Human Touch Technology. This powerful software features large, highly capable intelligence models specifically tailored to read and process data as efficiently as humans do.

human touch hero image 1
altra service icon

DataTools Altraservice™

Groundbreaking Performance.

Feel the need. 
The need for processing speed.

Our latest step in pushing the boundaries of batch processing data, this time in the direction of fast processing speeds.

altra service engine 1
data protection icon 1

Advanced Data Protection

Enterprise grade security.
Built from the ground up.

DataTools Seltaris is meticulously designed to protect your data at every step. Integrated into the core of our secure cloud environment, it utilises advanced encryption processes to handle your data without ever storing it unencrypted. 

bullet proof security 2
simple implementation icon 1

Design made simple

Innovation for all.

The best innovations are built for everyone.

At DataTools, we have always believed that data quality software should be simple.

simple design
health check report icon 1

Health Check Report

Data quality at its finest detail.

This Health Check Report delivers a clear and comprehensive assessment of your submitted address data delivered in an easy to read PDF, analysed through the DataTools Seltaris service.

health check report image 3

Bulk Data Enhancement Tool

EARLY ACCESS PREVIEW

DataTools Seltaris

High Quality Results, Unbelievable Performance. Incredibly Secure. ​