Ensure data protection without compromising productivity

Multifactor encryption done your way

Protecting against data exfiltration is a non-negotiable aspect of safeguarding unstructured data, yet balancing accessibility and security is complex. The ability to deploy multifactor encryption flexibly to meet the needs of your business makes you a data protection superhero.

Unrivaled data protection meets flexible deployment architectures

Mobile Device

Decrypt files through the power of the mobile device. Decryption occurs seamlessly, starting with a user clicking on a file. This triggers a prompt for the authenticated mobile device to provide the relevant key shards to reconstitute the encryption key and decrypt the file.

Simply tap approve, and the file opens. Or launch a session during which multiple files (throttled by volume and time policies set by the administrator) can be opened. Decryption is achieved without the need to approve each individual file.

Mobile device
Key Shard Server

Key Shard Server (KSS)

A wide range of use cases can benefit from multifactor encryption deployed with Atakama KSS. They KSS can be configured according to your business's security policies and workflows. Decryption events can be throttled according to customizable administrative policies, such as number of files, time of day, folder locations, and many more. For use cases centered on automated and batch file processing, the KSS deployment architecture offers maximum data protection.

Server-Managed Sessions

Combine the power and security of the KSS and mobile device architectures in a server-managed session deployment. Start the encryption workflow by prompting the mobile device to establish a KSS session. Following approval from the mobile device, the KSS is used to decrypt files in accordance with predefined administrative policies for the duration of the session.

Server Managed Sessions

Distributed Encryption Key Management

Protection for data at rest, using AES-256. A unique key for each object is automatically fragmented and distributed across a cluster of devices.

Untethered From IAM

Decouple file access verification from identity and access management, eliminating IAM as a single source of truth for verifying access.

Passwordless Local Encryption

Atakama encrypts and decrypts files locally on users' computers. Encrypted versions of the files are sent to a network drive or cloud storage. Only Atakama-enabled authorized users can access the encrypted files.

Seamless Integration and Deployment

Whether your business stores files on a network drive, in the cloud, or a hybrid model, Atakama is easily deployed within your existing environment.

Active Directory Integration

Deploy and manage Atakama across your organization to secure files within your existing network locations.

Platform Agnostic

Atakama is cross-compatible with all major desktop and mobile platforms so that data stays secure across all systems and devices.

Additional Resources

Additional Resources

No items found.

Which multifactor encryption architecture suits your environment