
Atakama's Multifactor Encryption is an advanced security solution designed to protect unstructured data from exfiltration and ransomware threats. By implementing distributed key management and threshold cryptography, Atakama ensures that each file is encrypted with a unique AES-256 bit key, which is then fragmented and distributed across multiple devices. This decentralized approach eliminates reliance on traditional identity and access management systems, enhancing security by requiring multiple authenticated devices to reconstitute the encryption key for file access. Key Features and Functionality: - Distributed Encryption Key Management: Utilizes AES-256 encryption, with each file's unique key fragmented and distributed across a cluster of devices, ensuring robust protection for data at rest. - Untethered from IAM: Decouples file access verification from identity and access management systems, eliminating IAM as a single point of failure and enhancing security. - Passwordless Local Encryption: Encrypts and decrypts files locally on users' computers, with encrypted versions stored on network drives or cloud storage, accessible only to authorized Atakama users. - Seamless Integration and Deployment: Easily integrates into existing environments, whether files are stored on network drives, in the cloud, or in hybrid models, without disrupting user workflows. - Intelligence Center: Provides data-driven insights for business reporting, compliance monitoring, operational decision-making, and anomaly threat detection by visualizing and alerting on the status and location of protected files, encryption events, and user activities. - Data Discovery and Classification Integration: Integrates with leading data classification tools to automatically encrypt files based on predefined policies, ensuring sensitive data is consistently protected. Primary Value and User Benefits: Atakama's Multifactor Encryption addresses the critical need for robust data protection by eliminating the threat of data exfiltration, even when traditional access controls fail. By decentralizing encryption key management and removing dependence on IAM systems, Atakama ensures that sensitive files remain secure, accessible only to authorized users. This approach not only enhances security but also simplifies compliance with data protection regulations and reduces the risk of costly data breaches.
Atakama's Application Level Database Encryption (ALE solution offers robust protection for sensitive data by encrypting information both at rest and during transmission. Unlike traditional Transparent Database Encryption (TDE systems that grant broad access upon user authentication, Atakama ensures that sensitive data remains encrypted until a specific access request is made. This approach maintains data confidentiality by decrypting information only within the application, ensuring that data on the server remains encrypted at all times. Key Features and Functionality: - Application-Level Encryption: Data is encrypted within the application as it is entered, ensuring that sensitive information is protected before transmission to the database. - User-Specific Decryption: Data is decrypted within the application only when a user explicitly requests access, maintaining strict control over sensitive information. - Multi-Factor Authentication: Access requests trigger a notification to the user's smartphone via the Atakama Mobile app. Approval on the mobile device sends a key fragment back to the workstation, enabling decryption. - Seamless Integration: Atakama's ALE can function as a transparent ODBC or REST proxy on the user's endpoint, making it suitable for legacy applications or systems without accessible source code. Primary Value and Problem Solved: Atakama's ALE solution addresses the critical need for securing sensitive database information by implementing encryption at the application level. This method ensures that data remains encrypted on the server and is only decrypted within the application upon user authorization. By decoupling data access from traditional identity and access management systems, Atakama reduces the risk of unauthorized access and data breaches, providing organizations with a robust and user-friendly approach to database security.
Atakama is a cybersecurity firm that specializes in enhancing data security through encryption solutions. It offers a unique, keyless encryption technology designed to protect sensitive information without relying on passwords or traditional centralized authentication methods. Atakama's approach focuses on distributed key management, ensuring that data can only be accessed when specific conditions are met, thereby mitigating unauthorized access risks. The company's solutions are particularly beneficial for organizations that handle highly sensitive data, providing robust protection against data breaches and cyber threats.