Atakama Encryption Is Sunsetting: PK Protect Has You Covered

Encryption is a critical part of data security. However, not all tools remain forever. Atakama encryption announced it is sunsetting its solution for multifactor. Atakama customers need not worry. We’ve partnered with the company to provide a smooth and secure transition.
Familiar Encryption and So Much More
The Atakama encryption you know and trust looks much the same with PK Protect Endpoint Manager (PEM). PEM automatically secures files while enabling seamless access.
Switching to PEM promises to be an easy migration with no disruption. You’ll be able to encrypt sensitive data within days. Expect a quick onboarding for continued compliance and risk reduction. You can learn how by watching our webinar on the transition.
Why You’ll Love PEM
PEM has all the encryption capabilities you have now with additional features. It modernizes data security, ensuring you meet compliance. It’s also a proactive approach to protecting sensitive data.
Persistent Encryption
Data encryption should be consistent, and it is when it’s persistent. It applies to data while at rest and in motion. Regardless of where data resides or moves, it remains secure. It also works to prevent exposure in the event of a breach.
Certificate-Free Smartkeys
Our Smartkey technology reduces overhead and costs since it doesn’t rely on certificates. This updated approach allows for secure data access for authorized users without impacting workflows.
PEM Smartkeys don’t need separate key infrastructure. It combines encryption keys and a corresponding access control list which determines who can use them.
Centralized Protection
One gap in many encryption solutions revolves around policy siloes. With PEM, you control them across the enterprise. It’s no extra work and no dependent upon user behavior.
Visibility with Audit Logs
You’ll have verifiable audit trails for encryption actions. It’s much more efficient than manual processes for evidence gathering. Early detection of anomalies is another benefit.
Contingency Keys
Prevent accidental data lockouts with contingency keys. If you lose the originals or passphrases, you can still keep operating.
More Features with PK Protect
PK Protect has additional capabilities designed for modern data security and protection.
- Data discovery: Find sensitive data wherever it resides continuously.
- Smart data classification: Label and govern data usage in real time.
- Automated redaction: Remove sensitive information from files so you can safely use and share it.
- Microsoft 365: Add discovery and protection for OneDrive and SharePoint.
Ready to Make the Move to PK Protect?
Atakama multifactor encryption will end in February of 2026. Don’t wait to find its replacement.
Get started by scheduling time with our team today.









