CLOAK SPECIFICATIONS | DETAILS |
---|---|
Encryption |
Unique cryptographic key for each user AES encryption (256 bit and above) RSA encryption (2048 bit and above) |
Single Sign-On |
Google ID, Facebook ID, Apple ID Active Directory, LDAP (with Security Gateway) |
Key Management | Tools for lost key recovery, endpoint revocation, user revocation |
Supported Platforms |
iOS 11 & above Android N & above Latest Chrome, Firefox, Safari and Edge Browsers Windows 10, Windows 8, Windows 7, Windows Vista, Windows XP Mac OS X |
Document-in-Storage Protection | All file formats |
Document-in-Transit Protection | All file formats |
Sharing |
Pre-defined sharing list Owner notification and approval of file access requests |
Privacy-by-Design | User can choose to keep their own Cloak Key. In this mode, Cloak Apps will not be able to have access to your encryption key. The downside is that key recovery is not possible if you lose them. Enterprise users can also create and store its users' keys at on-premise Cloak Gateway. |
ENTERPRISE GATEWAY SPECIFICATIONS | DETAILS |
---|---|
Single Sign-On |
Active Directory LDAP |
Data Messaging | Messaging queue with application layer encryption |
Data Encryption |
AES encryption (256 bit and above) RSA encryption (2048 bit and above) Diffie–Hellman |
Multi-Factor Authentication | Cloak Mobile Token application's One Time Password |
Mobile Token | Decouples enterprise login credentials from mobile application authentication |
Audit / Tracking | Audit trace for user activities and administration tasks |
Reliability Features |
Cloud services are built upon Amazon Web Services |
Enterprise Tools | Full featured web-based administration console |