The Easiest Way for DevSecOps Teams to Sanitize Production Data
Safely and efficiently manage fine-grained access to PostgreSQL databases while obfuscating sensitive data; all from a simple GUI. This lightweight proxy server does not require any modifications to your underlying database.

Deploy VeilStream in Minutes to Solve Four Common Challenges
Staging With Production-Like Data
Use VeilStream as a simple lightweight proxy server that filters and anonymizes data for use in your staging environment. With VeilStream, you can be assured that your staging environment is using the exact same schema as your production environment. Read live data or run pg_dump to create safe replicas for read/write testing while maintaining identical settings in the underlying databases across environments.
Prototype Development
AI based tools are increasingly being used in software development and prototyping and are even allowing product managers and designers to build functioning prototypes. With VeilStream, it's easy to put a protective layer in between your production data and your prototypes. After performing a security review, you can change a single environment variable to connect directly to production data.
Secure Incident Response
When responding to an incident, production data needs to be analyzed. As a proxy server that sits in front of the production database, VeilStream makes it easy to apply filters and anonymization rules so that only data that is relevant to the investigation is accessed. This this can all be done without making any changes to the production database or needing to make a copy of the production database.
Compliance Requirements
VeilStream is a simple and reliable method to add a layer of complex access control and data anonymization schemes without making potentially risky and hard-to-maintain changes to underlying databases or deploying complex solutions. For companies facing increased regulatory and contractual requirements related to internal data access or data sharing with partners, VeilStream can fast-track the path to compliance.
Safely and Efficiently Work with Sensitive Data

Graphical User Interface
With a simple GUI, team members in IT and compliance, can set permissions without needing to use a CLI or to make potentially risky changes against your database.

Create Safe Snapshots
Obfuscation allows you to easily and quickly create test databases that have the same schema and size as production but without the risk of leaking sensitive data.

Powerful Controls
Hide or obfuscate data on a per-user basis. Control access to columns or rows and use intelligent filters for fine-grained control and flexibility.

Flexible Deployment Options
There is no need to install an extension on your database. The proxy server and admin interface can be hosted by us or you can install them on your own infrastructure.
Why Organizations Love VeilStream
Ensuring that our testing and staging environments use production-like data without exposing confidential, sensitive, or private data more broadly than required has was challenging before VeilStream.
We had very little visibility into permissions granted directly inside PostgreSQL and we relied on software engineers to adjust permissions during dynamic situations. Now everything is visible in a simple GUI.
Before VeilStream, the process of creating a snapshot that will behave similar to the production database but without sensitive data was time consuming and it was easy to forget to obfuscate a sensitive column before using VeilStream.
Simplified data access management
We founded VeilStream to help organizations extract more value from their data without compromising safety. Complexity leads to inefficiencies, delays, and oversights. Our mission is to make it as easy as possible to manage safe and efficient access to data. We're starting with PostgreSQL because a very large portion of the world's valuable data is stored in PostgreSQL databases and it is increasingly the database of choice for software engineers that are building new products.

Flexible Pricing - 30 Day Free Trial
-
Free
-
Pro
-
Enterprise
|
Pro$20/mo/user/50 filtersBuy as few or many filter packs as you need. A filter is a rule to hide or anonymize data applied to a single user. A rule can be applied to a single column or to all rows in a database. |
Enterprise$CustomPlease contact us for additional deployment options, custom development, or bulk discounts beyond 500 filters. |
|
---|---|---|---|
Hide Data
|
|
|
|
Anonymize Data
|
|
|
|
Graphical User Interface
|
|
|
|
Filter Creation API |
|
|
|
Docker Deployment
|
|
|
|
Support |
E-mail 72 hour response
|
E-mail 12 hour response
|
Phone |
Training
|
Webinar
|
Webinar
|
Custom
|
Frequently Asked Questions
VeilStream is a lightweight proxy server that acts as a filter in between the database and your users or applications. Each user account exists in the database but VeilStream ensures that no unauthorized data is accessed by the user. VeilStream can control access on a column or row basis with intelligent rules and can also obfuscate a variety of data types to anonymize data.
Our solution consists of two components; a lightweight proxy server and an administration interface. Our suggested deployment model is for you to install the proxy server on your server and to use our SaaS deployment of the administration interface. A Docker container is available to facilitate the installation of the proxy server. This hybrid deployment is the default model offered in our pricing plans. Please contact us if you would like us to host both software components or if you would like to host them both on your own servers.
At least one person in your organization will need to know how to use PostgreSQL to initially set up VeilStream and to create new user accounts. From that point forward, anyone in your organization can quickly learn how to use the GUI to set up advanced access controls. This is one of the primary benefits of using VeilStream.
Yes, one of the advantages of using VeilStream is that you can use our API to dynamically create and remove filters for AI agents that are accessing your database depending on the scope of the work they are performing.