CLOAK SPECIFICATIONS DETAILS
Encryption Unique cryptographic key for each user
AES encryption (256 bit and above)
RSA encryption (2048 bit and above)
Single Sign-On Google ID, Facebook ID, Apple ID
Active Directory, LDAP (with Security Gateway)
Key Management Tools for lost key recovery, endpoint revocation, user revocation
Supported Platforms iOS 11 & above
Android N & above
Latest Chrome, Firefox, Safari and Edge Browsers
Windows 10, Windows 8, Windows 7, Windows Vista, Windows XP
Mac OS X
Document-in-Storage Protection All file formats
Document-in-Transit Protection All file formats
Sharing Pre-defined sharing list
Owner notification and approval of file access requests
Privacy-by-Design User can choose to keep their own Cloak Key. In this mode, Cloak Apps will not be able to have access to your encryption key. The downside is that key recovery is not possible if you lose them. Enterprise users can also create and store its users' keys at on-premise Cloak Gateway.
ENTERPRISE GATEWAY SPECIFICATIONS DETAILS
Single Sign-On Active Directory
LDAP
Data Messaging Messaging queue with application layer encryption
Data Encryption AES encryption (256 bit and above)
RSA encryption (2048 bit and above)
Diffie–Hellman
Multi-Factor Authentication Cloak Mobile Token application's One Time Password
Mobile Token Decouples enterprise login credentials from mobile application authentication
Audit / Tracking Audit trace for user activities and administration tasks
Reliability Features Cloud services are built upon Amazon Web Services
Enterprise Tools Full featured web-based administration console