Sendatrix Logo

SENDĀTRIX

Patented Data Protection — C Chains™
Securing Tomorrow's Data Today

What We Do

Sendatrix is the only data protection provider in the world offering patented Coordinative Transactional Processing (CTP) — a technology that makes protected data structurally unrecoverable from any single point of compromise, including a fully privileged database administrator.

We don't harden perimeters. We don't add encryption layers on top of existing systems. We fragment your most sensitive fields across three physically separated modules so that a breach — internal or external — yields nothing usable. That's not a feature. That's the architecture.

See It Work — Free How the Technology Works
Covered by U.S. Patent 9,405,927  ·  $5,000 Unanswered Breach Challenge since 2016
C Chains Lock emblem
$5,000

We Don't Ask You to Trust Us — We Dare You to Break Us

Since 2016, we have publicly offered $5,000 to anyone who can retrieve protected field data from a C Chains™-protected database when CTP protocols are followed. No solution has ever been submitted — in over eight years. That's not a marketing claim. That's a standing, open, funded challenge. Download the evaluation and try it yourself. The $5,000 is still on the table.

Take the Challenge → Understand Why It Holds
Why We're Different

We Don't Do Security — We Do Protection

Most security tools assume a breach will happen and try to detect or slow it down. C Chains™ operates on a different premise entirely: make the stolen data worthless. Even if an attacker gets in — even if they have DBA credentials — they leave with fragments that cannot be reconstructed from any single point of access.

🔐

Patented — Not Replicated

CTP is protected by U.S. Patent 9,405,927. No competitor offers tri-module fragmentation with codeset-validated transactional protection. This architecture exists nowhere else.

🧩

Structural, Not Procedural

Protection isn't dependent on policy compliance or user behavior. The architecture itself makes unauthorized reconstruction impossible — regardless of privilege level.

🔄

Real-Time and Batch

C Chains™ supports both triggered real-time insert protection (MBTIP) and batch processing — covering new data as it arrives and existing records in place.

🏗️

No Replacement Required

C Chains™ layers on top of your existing PostgreSQL environment. Same database, same applications, same queries. Zero infrastructure disruption.

Our Approach

How We Work With You

Our model is built around one idea: the right people should see this technology work before they make any commitment. That's why the evaluation is free, the software costs nothing, and the first 100 codesets are on us. Revenue comes from production deployments — not from locking you into a demo process.

📦

Free Evaluation First

Download the A Module, receive 100 free codesets by email, and watch protected fields become inaccessible on your own machine — no live data, no sales call, no commitment.

🧪

Try to Break It

During your evaluation you're actively encouraged to attempt a breach. Use any SQL method, any privilege level. The $5,000 challenge applies to your evaluation environment.

🤝

Direct Access to the Patent Holder

After your evaluation, you have a direct line to Douglas Dempsey — the developer and patent holder. No sales intermediaries. Questions get real answers from the source.

⚙️

Tailored Production Deployment

Production deployments are configured to your specific tables, fields, and hosting preferences. We support fully hosted, hybrid, and fully on-premises environments.

Our Role & Relationship

What Our Clients Can Expect From Us

Sendatrix is not a platform vendor with a support ticket queue and a quarterly roadmap call. We are a focused, direct team built around a single patented technology — and our relationship with clients reflects that. Here's what that means in practice.

🔍

Transparency Over Salesmanship

We show you exactly how it works before asking for anything. The evaluation is a genuine technical demonstration — not a guided sales experience.

🎯

Precision Over Breadth

We do one thing exceptionally well: protect specific sensitive fields at the database level using CTP. We don't try to be your entire security stack.

📞

Direct, Not Delegated

Questions about deployment, observed behavior, or technical architecture go directly to Douglas Dempsey — the person who built and patented the system.

📈

Revenue Aligned With Your Success

Software is free. Production revenue is generated through codeset transactions — meaning we only earn when the system is actively protecting your data in production.

🛡️

Compliance as a Byproduct

HIPAA, PCI DSS, and government audit requirements are satisfied by how CTP works — not by separate compliance tooling bolted on afterward.

♾️

Long-Term, Low-Maintenance

Once deployed, C Chains™ runs silently. No ongoing configuration, no retraining, no workflow changes. It protects — and stays out of the way.

Who We Protect

Industries We Serve

C Chains™ was built for organizations where the cost of a breach is measured in millions, reputations, and regulatory consequences — not just inconvenience.

🏥 Healthcare

PHI, patient records, and personnel databases — protected against the $7.42M average breach cost and HIPAA audit requirements.

💳 Financial Services

Transaction integrity, cardholder data, and PCI DSS compliance — structurally enforced, not policy-dependent.

🎓 Education

Student and faculty records secured against rising institutional attacks — without disrupting campus operations.

🏭 Manufacturing

Supply chain data and IP protection for the #1 breach target sector — always-on, zero-downtime deployment.

💻 Technology

Sensitive IP and development data secured — even against insider threats from privileged technical staff.

👥 Human Resources

Employee credentials, compensation records, and sensitive HR data — protected from the inside out across every industry.

The Best Way to Understand What We Do Is to See It

Words describe it. The evaluation proves it. Download the A Module, receive your 100 free codesets, and watch a DBA-privileged SQL query return nothing usable from a protected field. No live data. No commitment. No sales process.

  • Same production core — not a limited demo build
  • Patient table pre-seeded with SSN, DOB, and credit card fields
  • B and C Modules hosted by Sendatrix — you run only the A Module
  • Codesets emailed directly, typically within one business day
Start Free Evaluation Ask a Question First
$5,000 Breach Challenge Unanswered since 2016 — try it yourself