We created Atakama from the ground up to provide military-grade data protection without the need for traditional authentication using usernames, passwords, or one-time codes.
Atakama is cross-compatible with all major desktop and mobile platforms so your data can stay secure with any mix of systems and devices.
Atakama doesn't just secure files on your computer, it also enables you to safely keep your protected files in sync with major cloud storage services including Box, Dropbox, and Google Drive.
Use Atakama with cloud or network storage to securely share files with other Atakama users.
No internet? No problem. With support for Bluetooth Low Energy devices, you can always access your files.
Use Atakama's built-in search tool to search your encrypted files without having to decrypt them.
Traditional approaches to encryption mostly rely on passwords or centralized key management solutions, but these introduce user friction and risks. Atakama overcomes this with distributed key management architecture. Atakama encrypts each file with a unique encryption key. The unique key is then split into pieces that are each distributed and saved to devices you control.
With Atakama, only you can access your encrypted files. We never store any files or require you to use proprietary cloud storage. We can not open or view your files, and we don't know the quantity or size of the files you've encrypted.
Atakama encrypts and decrypts files locally on your computer. If you use a network drive or cloud storage, it is the encrypted version of your files that are sent to those locations. No one but you can access your encrypted files.
A lost or broken phone doesn't mean you won't be able to access your Atakama encrypted files. Atakama requires at least one backup device to ensure continued access to your files. Backup devices can belong to you (e.g., tablet) or to someone you trust (e.g., colleague, family, friend). These trusted contacts can't access your files, but they can help out if something happens to one of your devices.
Two-Factor Authentication is a simple way to strengthen a log-in process but has no impact on securing data within a system. Once you've been authenticated, you have access to everything.
Atakama takes full advantage of file-level encryption and keeps your files secure at all times. When you approve access to a specific file the remainder of your files remain encrypted.
Full disk encryption is designed to provide protection when users are logged out and not using their system. All files are encrypted using just one key typically based on the user’s account password, which creates a single point of failure.
Atakama encrypts at the file level, generating a unique key for each file, and provides active protection at all times. When you decrypt one file the remainder of your files remain encrypted with their own unique encryption key.
Passwords are great for some things, but not for everything. Especially when password-protected files need to be shared within cloud and network drive locations.
Atakama eliminates common security vulnerabilities by replacing the need for visible passwords with intuitive and advanced cryptography.