Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Atakama presents a unique information security solution that ensures business data remains protected from various attacks, even in scenarios where other security measures may falter. This platform allows for tailored security policies that align perfectly with your business requirements and user workflows. The priority of securing confidential data is paramount, whether it involves defending against external or internal threats. Atakama enables the safeguarding of sensitive materials, including earnings reports, personal identifiable information (PII), human resources records, merger and acquisition documents, engineering and scientific files, internal communications, investment strategies, and beyond. With the rising demand for encryption at the individual file level, and the growing complexity of state and federal cybersecurity regulations, organizations face heightened scrutiny and pressure. Ransomware incidents that lead to file theft and exposure can have catastrophic effects on any business. With Atakama, files are consistently encrypted on the client side, ensuring that only the encrypted versions of files are stored in the cloud or on servers, thereby enhancing overall data security and compliance. This robust approach to data protection not only mitigates risks but also fosters trust among stakeholders.

Description

Lock your cloud. Cryptomator gives you the keys to your data. Cryptomator quickly encrypts all your data. After encryption, you can upload your data protected to your cloud service. You can take control of the security and privacy of your data. Cryptomator is an easy tool for digital self defense. It allows you to secure your cloud data independently and by yourself. Most cloud providers either encrypt data only when it is transmitted or keep the keys for decryption. These keys can be stolen or copied and misused. Cryptomator gives you the keys to your data. Cryptomator makes it possible to access your files from any device. It is easy to use and seamlessly integrates with the cloud. Cryptomator's technology is up-to-date and encrypts files and filenames using AES and 256 bits key length. Cryptomator allows you to create a password for a folder (which we call a vault) within your cloud. That's it.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

AeroFTP
Amazon S3
Cyberduck
Dropbox
Google Drive
Microsoft OneDrive
Mountain Duck
leitzcloud by vBoxx
pCloud Business

Integrations

AeroFTP
Amazon S3
Cyberduck
Dropbox
Google Drive
Microsoft OneDrive
Mountain Duck
leitzcloud by vBoxx
pCloud Business

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Atakama

Founded

2014

Country

United States

Website

www.atakama.com

Vendor Details

Company Name

Skymatic GmbH

Founded

2016

Country

Germany

Website

cryptomator.org

Product Features

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Product Features

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Alternatives

BestCrypt Reviews

BestCrypt

Jetico

Alternatives

iSecurity Field Encryption Reviews

iSecurity Field Encryption

Raz-Lee Security
GhostVolt Reviews

GhostVolt

GhostVolt Ltd