Use cases

Proof, not promises.

Production deployments of searchable encryption across regulated industries. Real workloads, measured outcomes.