Spirion, a pioneer in data protection and compliance, and encryption software company Atakama today announced that they will demonstrate an integrated solution for classifying and protecting sensitive data through multi-factor file-level encryption at Black Hat USA 2021.

The unique combination of Spirion’s highly accurate data discovery and classification, together with Atakama’s granular, file-level encryption, enable security teams to simplify and strengthen enterprise rights management. It also removes end-user burden by automatically identifying and encrypting sensitive data, at the individual file level, without reliance on usernames or passwords.

On Wednesday, August 4, conference attendees that visit both the Spirion booth (#1272) and Atakama booth (#IC36) will be eligible to receive an encryption “key shard” giveaway. The special encrypted key shard will entitle visitors to attend a cocktail event at Mandalay Bay that evening. Details will be disclosed at both booths.

“Encrypting sensitive data is of the utmost importance, but most organizations don’t know where to begin. You can’t protect what you don’t know about,” said Scott Glazer, CRO of Atakama. “Our partnership with Spirion allows our clients to accurately identify the volume and value of their sensitive information and remediate their vulnerabilities through Atakama’s unique approach to file level encryption.”

“The surge in cloud adoption and modern remote work policies have obliterated the perimeter, requiring new strategies for data protection,” said Jen Holtvluwer, Chief Marketing Officer at Spirion. “We are pleased to partner with Atakama to reinvent enterprise rights management by enabling the appropriate level of encryption on a file-by-file basis depending upon the sensitivity of the data.”

How the Spirion-Atakama Solution Works
The solution starts with Spirion scanning and identifying sensitive data located on-premise, in the cloud, or on endpoints. Once discovered, sensitive files are automatically encrypted by Atakama according to policy, with each file receiving its own unique AES 256-bit key. Each key is further divided into fragments and distributed across physically separated devices to eliminate a single point of failure. The file is available only to authorized users, which they can unlock through a multi-factor approval process. By encrypting every file with its own unique encryption key, Atakama renders a breach almost completely useless.