Atakama, the pioneer in multifactor encryption, enabling unrivalled data protection through distributed cryptographic key management, announced its new multifactor encryption platform, Atakama Enterprise, featuring the Atakama Intelligence Center.

Atakama’s multifactor encryption combines advanced distributed key management (DKM) with the proven concept of multi-device authentication for a progressive security solution that challenges the status quo of conventional data protection.

Introduction of Atakama Enterprise

The introduction of Atakama Enterprise unlocks a new level of organisation-wide protection, control, and visibility of unstructured data secured by Atakama. 

Atakama Enterprise is comprised of five core solutions:

  • Multifactor Encryption enables unrivalled data protection through distributed cryptographic key management. Atakama’s unique approach to DKM leverages threshold cryptography to split encryption keys and disseminate the key shards among multiple devices. Successful file decryption occurs only when the authenticated devices reconstitute the key. Protecting sensitive files from exfiltration, even in the face of a data breach.
  • Intelligence Center provides a clear view of where encrypted data is located, who has access to it, and how it is being accessed. This unified view provides critical insights into the encrypted data landscape for business-level reporting, compliance monitoring and reporting, and anomaly threat detection. These capabilities enable an indelible audit trail and granular data analysis to fuel a data-centric security posture.
  • Secure File Transfer allows organisations to maintain complete security and control over files when sharing with third parties. Secure file transfer, with end-to-end multifactor encryption, eliminates passwords and cumbersome file transfer portals. As a result, employees can easily share information without compromising security standards.
  • Encrypted Search allows users to quickly find what they are looking for without decrypting sensitive files or the need to maintain an unencrypted search index exposing sensitive data, enabling user productivity without sacrificing security.
  • Data Discovery and Classification Integration introduces the automated process of encrypting sensitive data that has been discovered and appropriately classified. This seamless process leverages automated processes optimised to protect sensitive data against unauthorised access and data exfiltration.

Atakama Enterprise, featuring the Intelligence Center

Atakama Enterprise, featuring the Intelligence Center, strengthens its position as the de facto security solution for safeguarding sensitive data and preventing data exfiltration,” said Daniel H. Gallancy, CEO and Co-Founder of Atakama.

He adds, “Conventional encryption solutions and perimeter security defences continue to falter in the face of a data breach or malicious intent, which is why a data-centric approach to protecting your most valuable assets begins with Atakama’s multifactor encryption.”

Download PDF version Download PDF version

In case you missed it

What is the expanding role of audio in today's physical security systems?
What is the expanding role of audio in today's physical security systems?

Audio might detect sounds like breaking glass or footsteps before a person even enters the field-of-view of a video camera. Audio also helps to provide context: Someone running in...

Marin Hospital enhances security with eCLIQ access control
Marin Hospital enhances security with eCLIQ access control

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

Climax releases an advanced smart telecare solution with voice control
Climax releases an advanced smart telecare solution with voice control

GX-MAX-DT35B Smart Care Medical Alarm comes with a brand-new case design. The battery level and the cellular signal strength will be indicated through the white bar on the top cove...

Quick poll
Which feature is most important in a video surveillance system?