Atakama, the pioneer in multifactor encryption, enabling unrivalled data protection through distributed cryptographic key management, announced its new multifactor encryption platform, Atakama Enterprise, featuring the Atakama Intelligence Center.

Atakama’s multifactor encryption combines advanced distributed key management (DKM) with the proven concept of multi-device authentication for a progressive security solution that challenges the status quo of conventional data protection.

Introduction of Atakama Enterprise

The introduction of Atakama Enterprise unlocks a new level of organisation-wide protection, control, and visibility of unstructured data secured by Atakama. 

Atakama Enterprise is comprised of five core solutions:

  • Multifactor Encryption enables unrivalled data protection through distributed cryptographic key management. Atakama’s unique approach to DKM leverages threshold cryptography to split encryption keys and disseminate the key shards among multiple devices. Successful file decryption occurs only when the authenticated devices reconstitute the key. Protecting sensitive files from exfiltration, even in the face of a data breach.
  • Intelligence Center provides a clear view of where encrypted data is located, who has access to it, and how it is being accessed. This unified view provides critical insights into the encrypted data landscape for business-level reporting, compliance monitoring and reporting, and anomaly threat detection. These capabilities enable an indelible audit trail and granular data analysis to fuel a data-centric security posture.
  • Secure File Transfer allows organisations to maintain complete security and control over files when sharing with third parties. Secure file transfer, with end-to-end multifactor encryption, eliminates passwords and cumbersome file transfer portals. As a result, employees can easily share information without compromising security standards.
  • Encrypted Search allows users to quickly find what they are looking for without decrypting sensitive files or the need to maintain an unencrypted search index exposing sensitive data, enabling user productivity without sacrificing security.
  • Data Discovery and Classification Integration introduces the automated process of encrypting sensitive data that has been discovered and appropriately classified. This seamless process leverages automated processes optimised to protect sensitive data against unauthorised access and data exfiltration.

Atakama Enterprise, featuring the Intelligence Center

Atakama Enterprise, featuring the Intelligence Center, strengthens its position as the de facto security solution for safeguarding sensitive data and preventing data exfiltration,” said Daniel H. Gallancy, CEO and Co-Founder of Atakama.

He adds, “Conventional encryption solutions and perimeter security defences continue to falter in the face of a data breach or malicious intent, which is why a data-centric approach to protecting your most valuable assets begins with Atakama’s multifactor encryption.”

In case you missed it

Which vertical markets have the greatest growth potential for security?
Which vertical markets have the greatest growth potential for security?

To serve various vertical markets and industries effectively, security professionals must recognise that each sector has unique assets, risks, compliance requirements, and operatio...

Marin Hospital enhances security with eCLIQ access control
Marin Hospital enhances security with eCLIQ access control

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s behind (perimeter) door #1?
What’s behind (perimeter) door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...