Code-X Introduces Lattice-Based Data Protection Platform

Security startup emerges from stealth and announces $5 million in Series A funding

Code-X today emerged from stealth to launch the first-ever commercially available lattice-based data protection platform validated by the United States Department of Defense (U.S. DOD) and intelligence community. The Code-X platform was recently tested under extreme conditions by the U.S. DOD and members of the intelligence community and both validated its ability to protect sensitive information and critical systems across multiple environments simultaneously. The U.S. DOD testing also validated that the Code-X platform increases packet management, network throughput, storage redundancy and continuity while reducing overall processing requirements.

“For years, experts have warned of the increased threat of malicious actors and nation-states in the IT world. With accelerating advancements in technology and the threat of quantum computing looming, these advances will continue to work against organizations protecting the world’s most sensitive data,” said Darren LaCroix, founder and CEO of Code-X. “The Code-X platform is purpose-built to ensure highly regulated organizations can authenticate and trust that their data and systems are secure. Our combination of proprietary technology and lattice equations make the Code-X platform the first-ever efficient, lattice-based security solution that helps organizations reverse the trend of malicious toolsets being on a parallel path with the advancement of technology.”

Delivering Lattice-Based Encryption for Truly Secure Data Protection

The Code-X platform is a lightweight, vendor-agnostic software offering that employs a multi-dimensional, lattice-based approach to data security. Built on years of research and development from leaders in the technology, military and intelligence communities, Code-X delivers impermeable security from the moment of data creation throughout its entire life cycle while also being system and device-friendly. This is possible due to its proprietary pseudo-random, lattice-based engine.

Code-X applies proprietary techniques to create five dimensions of security, all acting simultaneously and rendering nearly all modern malicious tools obsolete. Code-X’s structuring, networking, authentication, management and monitoring of data and systems in real-time prevents data corruption or loss with a significant return on investment. These features provide customers block-level control and the ability to detect tamper or theft in real-time. The Code-X platform also provides real-time audit logging, user management, alert and alarm systems, and instantaneous forensics.

Code-X Unveils Strategic Additions and Funding

In addition to launching the Code-X platform, the company also announced $5 million in Series A funding led by By Light Professional IT Services LLC (By Light) with participation from fama Ventures. The funding will be used for sales and marketing efforts.

And as part of Code-X’s strategic vision, the company also welcomed Lieutenant General (ret.) Vincent Stewart, former Deputy Commander of the U.S. Cyber Command, and other distinguished military, intelligence and security experts to the Code-X team.

“As a leader in U.S. intelligence and global cyber programs, I have been privileged to lead our nation’s most talented cyber operation professionals and the leading-edge cyber tools they employed. I also had a unique perspective into companies claiming to address every type of cyber vulnerability,” said Stewart. “Code-X approaches cybersecurity from an entirely different perspective than other companies. Through its unique architecture and design, Code-X delivers a truly novel encryption and authentication solution that solves today’s most complex data security challenges while preparing organizations for future threats.”

The Code-X security platform is available today. To learn more about Code-X and its offering, visit the company’s new website at

Previous ArticleNext Article

Leave a Reply

Your email address will not be published. Required fields are marked *