Cloak Encrypt 4+

Cloak Pte. Ltd.

Designed for iPad

    • 4.0 • 4 Ratings
    • Free

Screenshots

Description

Cloak provides simple password-free file encryption.

Cloak supports sign in with your Apple, Google, Facebook or Dropbox ID. If your team likes it, it is easy for your organization to enable its staff to sign on to Cloak Apps using their Windows Active Directory or LDAP accounts, through our Cloak Gateway.

Cloak (encrypt) your files, so that you can safely store or share them on the cloud or via email. Only your authorized recipients will be able to uncloak (decrypt) the files. With our key management services, there are no file passwords to send to recipients.

It also works out of the box across major platforms. This product is free to use and is not plagued by advertisements. As a privacy protection tool, it only asks for minimum permissions on your device.

Advanced security specifications:

1.Encryption:
a. Client-end encryption
b. Client-end key generation
c. Unique cryptographic key for each user
d. AES encryption (256 bit)
e. RSA encryption (2048 bit)
f. ECC encryption
f. PKI and X509 support

2. Single Sign-On (Google, Facebook, Dropbox, Box)

3. Enterprise Single Sign-On (ADFS/LDAP through *Cloak Gateway)

4. Multi-Factor Authentication (with *Cloak Gateway)

5. User Key Control (with *Cloak Gateway)

6. Key Management Tools for:
a. Lost certificate recovery
b. Endpoint revocation
c. User revocation

7. Sharing
a. No file password required
b. Company groups and users sharing
c. Owner notification and approval of file access requests


* Cloak Gateway is a enterprise service. Kindly contact us for a demo.

What’s New

Version 6.5.0

Minor updates due to 3rd Party Libs changes.

Ratings and Reviews

4.0 out of 5
4 Ratings

4 Ratings

App Privacy

The developer, Cloak Pte. Ltd., indicated that the app’s privacy practices may include handling of data as described below. For more information, see the developer’s privacy policy.

Data Linked to You

The following data may be collected and linked to your identity:

  • Contact Info
  • Identifiers
  • Usage Data

Data Not Linked to You

The following data may be collected but it is not linked to your identity:

  • Contact Info

Privacy practices may vary, for example, based on the features you use or your age. Learn More

More By This Developer

You Might Also Like

Cloaked Data
Productivity
Amaryllo Encryption
Productivity
Lockmagic
Productivity
ByteShare
Productivity
VaultTek Mobile
Productivity
Sectra Mobile VPN
Productivity