Schedule a Demo
Limitless Functionality

Use with any number of devices, files, users and create any number of Trust Boundaries.

Compliance

SEAhawk comes with extensive logging and reporting which ensures compliance, especially in the case of suspected lost or stolen laptops

Simple Deployment and Management

With automatic enrolment, and instant SED activation, you are protected right away. SEAhawk keeps management to the bare minimum to get you working as fast as possible.

Features

Software FDE

Software Full Disk Encryption is available for non SEDs. We use the government grade AES cipher to secure your system disks, fixed disks, removable storage devices, and files. There is no conscious decision to make as to whether a document is sensitive enough to be encrypted or not. Everything on the Disk is encrypted! By virtue of FDE, encryption is mandatory and enforceability comes naturally.

Hardware FDE (SED)

Self-Encrypting Drives (SEDs), encrypt data themselves. Self-Encrypting Drives provide all the benefits of software FDE with none of its drawbacks. SEAhawk protects your entire disk with full disk encryption, intelligently turns on authentication for Self-Encrypting Drives if you have them or falls back to software-based FDE for your legacy drives. The UI and operational experience is the same in either case

Centralized Management

Using advanced state-of-the-art Web-standards based protocols, administrators are able to setup, configure and manage their organization’s security.

Looking to learn more?

Check out the SEAhawk™ White Paper

Cryptographic Erase

A company's data is its life-blood. Many companies have implemented various methods of backing up and securing data, since data loss and data theft can be disastrous. Encryption is one way to ensure that data is protected from unauthorized access and data theft.

Unattended Login For System Maintenance

As the SEAhawk-protected PC enters a special boot environment when it is powered up. This is known as the Pre-boot Authentication Environment. In typical daily usage, the PC’s user logs in through the pre-boot environment, providing his/her password to authenticate, and then the PC boots through into Windows.
However, IT maintenance operations require a different means to boot into Windows.

In a centrally-managed enterprise, many IT operations (such as performing software upgrades, installing OS service packs, patching, etc.) require access to the PC in the absence of the day-to-day end-user. Typically, this access is needed when upgrades are done overnight, a process which keeps the PC up-to-date without interrupting the users’ productivity during the day.

In order to support this kind of automated PC maintenance, the SEAhawk pre-boot environment provides an Unattended Login capability. To take advantage of this feature, the PC must be connected to the enterprise network, and must be able to contact the CryptoMill Site Active Management Server (SAMS) over the network. (The SAMS is a light-weight management server that resides on the enterprise’s network.)

USB Protection And Much More

Prevents copying of sensitive data to unencrypted USB drives and removable media while permitting use of encrypted media. Email File Encryptor Protect Email attachments and files of any type with SEAhawk’s easy, ‘point-and-click’ file protection.

Trust Boundaries

A Trust Boundary (TB) provides data containment by binding the data to an organization. This prevents data from falling into the wrong hands either accidentally or intentionally. TBs Protect Data, Prevent Internal Breaches and allow for Easy Group Sharing.

Private Virtual Disks

Keep sensitive information private, even from other users of the same hardware using encrypted SEAhawk Virtual Disks.

Email File Encryptor

Protect email attachments and files of any type with SEAhawk’s easy, ‘point-and-click’ file protection.

Looking to learn more?

We're here to help

Automatic Authentication

Authentication is provided by secure Site Active Management Server (SAMS) Data protection runs as a service – no user intervention required

Packages

Basic

Software FDE
Hardware FDE (SED)
Cryptographic Erase
Unattended Login
Centralized Management

Premium Protection

All Basic Features
Trust Boundaries
Private Virtual Disks (SED)
Email File Encryptor
USB Protection And Much More

SEAhawk For Servers

Automatic Authentication
Trust Boundaries
Private Virtual Disks
Centralized Management
USB Protection And Much More