Sendatrix is the only data protection provider in the world offering patented Coordinative Transactional Processing (CTP) — a technology that makes protected data structurally unrecoverable from any single point of compromise, including a fully privileged database administrator.
We don't harden perimeters. We don't add encryption layers on top of existing systems. We fragment your most sensitive fields across three physically separated modules so that a breach — internal or external — yields nothing usable. That's not a feature. That's the architecture.
Since 2016, we have publicly offered $5,000 to anyone who can retrieve protected field data from a C Chains™-protected database when CTP protocols are followed. No solution has ever been submitted — in over eight years. That's not a marketing claim. That's a standing, open, funded challenge. Download the evaluation and try it yourself. The $5,000 is still on the table.
Take the Challenge → Understand Why It HoldsMost security tools assume a breach will happen and try to detect or slow it down. C Chains™ operates on a different premise entirely: make the stolen data worthless. Even if an attacker gets in — even if they have DBA credentials — they leave with fragments that cannot be reconstructed from any single point of access.
CTP is protected by U.S. Patent 9,405,927. No competitor offers tri-module fragmentation with codeset-validated transactional protection. This architecture exists nowhere else.
Protection isn't dependent on policy compliance or user behavior. The architecture itself makes unauthorized reconstruction impossible — regardless of privilege level.
C Chains™ supports both triggered real-time insert protection (MBTIP) and batch processing — covering new data as it arrives and existing records in place.
C Chains™ layers on top of your existing PostgreSQL environment. Same database, same applications, same queries. Zero infrastructure disruption.
Our model is built around one idea: the right people should see this technology work before they make any commitment. That's why the evaluation is free, the software costs nothing, and the first 100 codesets are on us. Revenue comes from production deployments — not from locking you into a demo process.
Download the A Module, receive 100 free codesets by email, and watch protected fields become inaccessible on your own machine — no live data, no sales call, no commitment.
During your evaluation you're actively encouraged to attempt a breach. Use any SQL method, any privilege level. The $5,000 challenge applies to your evaluation environment.
After your evaluation, you have a direct line to Douglas Dempsey — the developer and patent holder. No sales intermediaries. Questions get real answers from the source.
Production deployments are configured to your specific tables, fields, and hosting preferences. We support fully hosted, hybrid, and fully on-premises environments.
Sendatrix is not a platform vendor with a support ticket queue and a quarterly roadmap call. We are a focused, direct team built around a single patented technology — and our relationship with clients reflects that. Here's what that means in practice.
We show you exactly how it works before asking for anything. The evaluation is a genuine technical demonstration — not a guided sales experience.
We do one thing exceptionally well: protect specific sensitive fields at the database level using CTP. We don't try to be your entire security stack.
Questions about deployment, observed behavior, or technical architecture go directly to Douglas Dempsey — the person who built and patented the system.
Software is free. Production revenue is generated through codeset transactions — meaning we only earn when the system is actively protecting your data in production.
HIPAA, PCI DSS, and government audit requirements are satisfied by how CTP works — not by separate compliance tooling bolted on afterward.
Once deployed, C Chains™ runs silently. No ongoing configuration, no retraining, no workflow changes. It protects — and stays out of the way.
C Chains™ was built for organizations where the cost of a breach is measured in millions, reputations, and regulatory consequences — not just inconvenience.
PHI, patient records, and personnel databases — protected against the $7.42M average breach cost and HIPAA audit requirements.
Transaction integrity, cardholder data, and PCI DSS compliance — structurally enforced, not policy-dependent.
Student and faculty records secured against rising institutional attacks — without disrupting campus operations.
Supply chain data and IP protection for the #1 breach target sector — always-on, zero-downtime deployment.
Sensitive IP and development data secured — even against insider threats from privileged technical staff.
Employee credentials, compensation records, and sensitive HR data — protected from the inside out across every industry.
Words describe it. The evaluation proves it. Download the A Module, receive your 100 free codesets, and watch a DBA-privileged SQL query return nothing usable from a protected field. No live data. No commitment. No sales process.