Multifactor encryption done your way
Protecting against data exfiltration is a non-negotiable aspect of safeguarding unstructured data, yet balancing accessibility and security is complex. The ability to deploy multifactor encryption flexibly to meet the needs of your business makes you a data protection superhero.
Decrypt files through the power of the mobile device. Decryption occurs seamlessly, starting with a user clicking on a file. This triggers a prompt for the authenticated mobile device to provide the relevant key shards to reconstitute the encryption key and decrypt the file.
Simply tap approve, and the file opens. Or launch a session during which multiple files (throttled by volume and time policies set by the administrator) can be opened. Decryption is achieved without the need to approve each individual file.
A wide range of use cases can benefit from multifactor encryption deployed with Atakama KSS. They KSS can be configured according to your business's security policies and workflows. Decryption events can be throttled according to customizable administrative policies, such as number of files, time of day, folder locations, and many more. For use cases centered on automated and batch file processing, the KSS deployment architecture offers maximum data protection.
Combine the power and security of the KSS and mobile device architectures in a server-managed session deployment. Start the encryption workflow by prompting the mobile device to establish a KSS session. Following approval from the mobile device, the KSS is used to decrypt files in accordance with predefined administrative policies for the duration of the session.
Protection for data at rest, using AES-256. A unique key for each object is automatically fragmented and distributed across a cluster of devices.
Decouple file access verification from identity and access management, eliminating IAM as a single source of truth for verifying access.
Atakama encrypts and decrypts files locally on users' computers. Encrypted versions of the files are sent to a network drive or cloud storage. Only Atakama-enabled authorized users can access the encrypted files.
Whether your business stores files on a network drive, in the cloud, or a hybrid model, Atakama is easily deployed within your existing environment.
Deploy and manage Atakama across your organization to secure files within your existing network locations.
Atakama is cross-compatible with all major desktop and mobile platforms so that data stays secure across all systems and devices.