Stateless. Client-side. Sovereign.
We never see, read or store your data. Ever.
QES is a stateless, client-side encryption platform for government, defence, enterprises and SMBs. Even when identities, devices or clouds are breached, attackers still see ciphertext – not your data.
Client-side only
Post-quantum ready
Built in Sydney
Assume breach
Design for compromised accounts, endpoints and SaaS – and still protect the data.
Cross-platform
One encryption standard across desktop, Android and the browser.
Stateless SaaS
Licensing, telemetry and updates – without central key custody or plaintext.
Sovereign-ready
Data and key custody stay with you; align with Australian sovereignty needs.
Designed for teams that cannot afford plaintext leaks:
Government & Defence
Critical Infrastructure
Legal & Financial
Healthcare
High-value SMBs
When everything else fails, your data shouldn't.
Identity will be phished, endpoints will be popped and clouds will be misconfigured. QES exists to make sure that even when that happens, the critical data remains encrypted.
Client-side by default
All encryption and decryption happen on your devices. QES never operates a decryption service and never holds your keys.
Stateless SaaS
Our backend handles licensing, updates and minimal telemetry – not plaintext or key material. Compromise us and attackers still get ciphertext.
Built for real workflows
Wrap existing storage, email and collaboration tools instead of forcing a rip-and-replace. Encrypt where the user already works.
Government & defence first. Everyone else benefits.
QES is designed to meet the expectations of government, defence and critical infrastructure – then packaged so enterprises and SMBs can actually use it.
Stateless architecture aligned with sovereignty and key-custody requirements.
Clear threat modelling and documentation for assurance processes.
Roadmap aligned with national cyber strategies and post-quantum standards.
Government & Agencies
Encrypt sensitive documents before they hit mailboxes, portals or clouds.
Defence & Industry
Protect program data, supply-chain artefacts and classified-adjacent material.
SMBs & Enterprises
Standardise file encryption across teams, devices and toolsets.
Integrity over convenience
No hidden decryption paths, no quiet changes to key handling, no backdoors.
Culture and security principles you can actually audit.
We treat security as an engineering discipline, not a marketing slogan. These are the principles we hold ourselves to – and that you can hold us to.
Assume breach
We design every flow as if identities, devices and platforms can be compromised.
Transparent design
We document our cryptographic choices, threat models and limitations in plain language.
Ready to talk about your last line of defence?
Whether you're a government cluster, defence supplier or high-value SMB, we'll map QES to your real-world workflows and constraints.
Prefer email? Reach us at hello@qes.example