Obsidian is an easily installed platform that delivers robust data protection solutions.

Users who handle sensitive data simply install the Obsidian Gate app on their devices so that any content they create is encrypted before being stored. Access tools enable rapid search and retrieval of encrypted data by transparently decrypting on access after authentication, in accordance with designated permissions.

Access is continuously monitored, and management is alerted to any potential or actual security breaches.

Paul Mitchell

  1. End User access permissions are determined by organisational policy and implemented by Obsidian Admin.

  2. Selected End Users have the Obsidian Gate installed on their phone, tablet and desktop devices (Android or Apple) according to policy.

  3. The API layer (Application Programming Interface) allows the End User to interact with databases via Obsidian enabled devices. The API acts as a messenger conveying requests and delivering responses. It also supports the development of future applications.

  1. Incoming data items are indexed, encrypted and stored in content specific repositories.

  2. Access tools enable Search and Retrieval of data items from these repositories in accordance with designated permissions.

  3. Monitoring tools alert admin and management to potential or actual security breaches and provide an audit trail of access activity.


  • Protects your critical data against internal and external threats

  • Provides managed access to secure data in real time

  • Monitors who is accessing your data

  • Alerts you to any security breaches

  • Shields your staff from menacing approaches

  • Provides multi jurisdictional capability whilst encryption keys remain in the home jurisdiction


  • Mitigation of financial and reputational risk ... your commercially sensitive data is safe, and your customers are afforded privacy.

  • Assists compliance with legislation in multiple jurisdictions such as the EU’s General Data Protection Regulation (2018), the Australian Privacy Act (1988), the New Zealand Privacy Act (1993) amongst others. Penalties are substantial and may include imprisonment.

  • Reduced cost of compliance through ease of implementation and roll out. As a holistic solution, your IT department can protect your critical data with a single platform.

  • Fast and efficient searching and retrieval of encrypted data, reducing the effort required to complete tasks such as forensic audits.

  • Peace of mind for staff who may be confronted with a ‘digital strip search’ when travelling abroad. No critical data is stored on devices, and an ‘alternative’ data base can be accessed enabling ‘compliance’ without compromising data security.

Paul Mitchell
Mobile: +61 433 349 809

CoolRock Software
Level 5, 171 Collins Street
Melbourne 3000

83 Victoria Street
London SW1H 0HW, UK