Choose an EnCloak device to suit your requirements for securing documents: from an encrypted drive designed to hide sensitive data, through to sharing and transferring files amongst multiple groups.
We make high-grade encryption simple for everyone.
Utilising dedicated hardware, without software, EnCloak devices may be used directly with any computer – even in many corporate environments.
EnCloak products are designed and manufactured in the UK.
EnCloak HIDE
An encrypted disk… made simple and discrete.
Hide and secure
your sensitive documents.
EnCloak HIDE is an encrypted disk drive (7GB) intended to hide private or sensitive documents.
When initially connected to any computer it appears to be a normal flash drive (1GB), but with a twist…
Once your credentials are entered (in a unique way) the drive will re-attach revealing an additional hidden EnCloak partition (7GB), which is itself AES-256 encrypted but presented like a normal drive. Files on the hidden partition may be accessed just like those in any other folder, but everything contained within is both hidden and encrypted.
EnCloak HIDE will be available soon
Features
- Discrete USB drive with hidden encrypted partition to secure and hide your private files. Not obvious it is an encrypted drive.
- No software or drivers required: will operate on any corporate machine that permits removable drives.
- No fiddly keypad.
- Highly secure because no software is required. All operations within device.
- Simple to setup and operate via drag and drop.
- Multi-level security utilising PUF technology & AES-256 encryption.
EnCloak CONNECT
Dedicated file encryption hardware you can trust
Securely encrypt and share important team documents
EnCloak CONNECT is a dedicated hardware device intended to facilitate transfer and sharing of encrypted documents amongst a small group for whom privacy is paramount. Each group member requires a CONNECT device. It is not a storage device – no sensitive files are retained once unplugged. And no software needs to be installed; everything is managed though familiar file operations.
When initially connected to any computer it appears to be a normal flash drive (1GB), but when your credentials are entered (in a unique way) the drive will re-attach revealing an additional hidden EnCloak partition, which is used for AES-256 file encryption and decryption through drag and drop operations.
Whilst EnCloak CONNECT may be used by an individual to securely encrypt personal files that are stored externally, the real power lies in the ability to form a single group of CONNECT devices. Files encrypted by a CONNECT device may only be decrypted by the original device or others within the EnCloak Group. In this way, an Encrypted Transfer System is effectively created between remote EnCloak devices, permitting files to be securely transferred between two parties via any method (flash drive, email, cloud service, etc…)
EnCloak CONNECT will be available soon
Features
- Discrete. Not obvious it is an encryption device. Operates just like a standard drive when not in EnCloak mode.
- Dedicated USB hardware to securely AES-256 encrypt/decrypt documents for yourself or a team.
- Not a storage device. No files are retained when unplugged.
- Group multiple devices: files may only be decrypted by other (possibly anonymous) group members without having to use passwords or keys
- Effectively creates an ‘Encrypted Transfer System’ to share sensitive documents on-line without risk of encryption backdoors on cloud services.
- No software or drivers required: will operate on any corporate machine that permits flash drives.
- Highly secure because no software is required. All operations within device.
- Simple to setup and operate via drag and drop.
EnCloak PRO
Our most flexible and advanced EnCloak encryption device
Ultimately secure through physical pairing and able to manage multiple teams.
Building on EnCloak CONNECT, the PRO is for those who require the utmost security. Two key features are added: hardware pairing and the ability to manage multiple groups of CONNECT or PRO devices. Again, it is not a storage device – no sensitive files are retained once unplugged. And no software needs to be installed; everything is managed though familiar file operations.
With EnCloak PRO, physical pairing adds an additional layer of security. A dedicated pairing port requires devices to be physically plugged together (initially) to transfer keys, prior to being added to a group and being able to encrypt/decrypt files. This improves on the EnCloak CONNECT where an encrypted key file must be exchanged (once) as part of a group invite.
In addition, EnCloak PRO allows multiple, independent groups to be created and managed from paired devices. Files encrypted for one group cannot be read by members of another group. This is ideal for larger teams or handling multiple clients.
One or more EnCloak PRO devices may be used together with EnCloak CONNECT to provide and manage these advanced features for all users.
EnCloak PRO is in final development.
Features
- Builds on to EnCloak CONNECT to add additional PRO group management and security features).
- Unique hardware-pairing function using a dedicated port further enhances group security to avoid any possible snooping by 3rd parties.
- Permits multiple groups and group management. Each group member is only able to decrypt files intended for their group (of paired devices).
- Readily integrates into existing workflows.
- A single EnCloak PRO may be used together with multiple CONNECT devices, The PRO acts as the master providing additional security and flexibility.
- No software or drivers required: will operate on any corporate machine that permits removable drives.
- Operates just like a standard drive when not in EnCloak mode.
- Simple to setup and operate via drag and drop.
- Smaller form-factor with USB-C connectors.
EnCloak Product Comparison
FEATURES | EnCloak HIDE | EnCloak CONNECT | EnCloak PRO |
---|---|---|---|
Discrete encrypted drive for personal use | Encrypt and securely share within your team | Encrypt, share and manage multiple teams with hardware paired devices | |
NO software or drivers required to use | |||
NO cloud service or subscriptions required to Use | |||
NO encrypted key exchange (enhancing security) | |||
Annonymity | |||
Compatible with Major Operating Systems | |||
Works on any system where Removable Media are permitted | |||
NO requirement for Administrator permissions | |||
Device Management & Configuration via file operations | |||
Individual Device Security | Passphrase with unique entry method | Passphrase with unique entry method | Passphrase with unique entry method |
Masquaredes as standard USB drive until passphrase is entered | |||
Multifunction LED for status display | |||
Secure Firmware Upgrade | |||
Recovery from device loss or failure | Limited | Limited | |
Encryption Level | Drive Level | File Level | File Level |
AES-256 Encryption | |||
Multiple-level Security/Encryption within EnCloak Device | |||
File Storage (retention when removed) | Persistent | Non-Persistent | Non-Persistent |
Move Encrypted Files On/Off EnCloak Device | |||
Standard (Masquarede) Partition Memory Size | 1 GB | 1 GB | 1 GB |
EnCloak Partition Memory Size | 7 GB | 2 GB | 2 GB |
Interface Speed | USB 2.0 | USB 2.0 | USB 2.0 |
USB Connector(s) | USB Type A/C | USB Type A/C | USB Type C |
Intended Application | Hide & encrypt personal documents | Highly secure sharing of encrypted documents | Highly secure and flexible sharing of encrypted documents |
Number of User Groups | One | Unlimited | |
Maximum Group Size | Unlimited | Unlimited | |
Encryption keys known to manufacturer | |||
Decryption Possible ONLY by paired EnCloak Devices and group members | |||
Dedicated Hardware Pairing Port to enhance security | |||
Hardware pair multiple devices | |||
Pairing Compatibility | EnCloak PRO | EnCloak PRO / CONNECT | |
Availability | Available soon | Available soon | In final development |