FAQs
  • 25 Jul 2022
  • 3 Minutes to read
  • Contributors
  • Dark
    Light

FAQs

  • Dark
    Light


This article includes answers to frequently asked questions about the Anchor ecosystem.

What is Anchor?

Anchor is a SaaS platform, with an endpoint component, that bakes protection into your files with a unique transparent combination of encryption, continuous multi-factor access controls, and a digital chain of custody. When you share or collaborate, Anchor protection stays with your data, even when it leaves your organization. Anchor empowers you to maintain control of your files while collaborating, including forensic logging and revoking access. Anchor inverts the equation by baking protection into the data, invisible to the business users (like antivirus), so that files are to free travel and security is out of the way. Simply put, wherever the data goes, it is protected.

To see how Anchor works for yourself, Click Here to visit our Anchor trial page.


When is Anchor a good choice?

Simply put, Anchor is an excellent choice for those who have sensitive information they need to protect. Anchor utilizes FIPS-validated encryption to protect your data in a way that is simple and transparent to the end-user. Anchor is great for those who don't want to change their existing workflows or IT controls, and who desire a frictionless user experience. 

Specific use cases and features include:

  • Preventing data exfiltration
  • Secure sharing and collaboration
  • Revoking access
  • Compliance (CMMC, GDPR, etc.)
  • Internal threats from exiting employees, admins, or negligence
  • Cybersecurity (attaining, renewing, lowering price)

How easy is it to get started with Anchor?

In under 45 minutes, Anchor is fully deployed and empowers your business users to securely work and collaborate without complicated security products or rules in the way.

Will the Anchor agent impact machine performance?

Existing as a set of lite drivers on the OS, the Anchor agent does not impact machine performance. The agent is light on the IT infrastructure, requiring minimal space, memory, or operating power.

Will I notice the Anchor agent on my computer?

The Anchor agent is transparent to end-users. It runs in the background and does not require the user to interact with encryption.  If access rules are met, the anchored files open normally. The Anchor agent becomes visible only when the user is breaking access rules that have been defined in order to consume the data.  


What Operating Systems are supported by Anchor?
Windows 10 & 11

Windows Server 2016 and above
macOS is slated for Q4 2022

What Operating systems are supported by the Anchor mobile app?
- iOS 13.0 and above
- Android 10 and above


How does the Anchor solve the problem?

Anchor is a high-performance, data-centric security solution that enables access without conceding ownership of the data.  Our zero-trust via encryption methodology implants “access rule-based” security that travels with the data.  Anchored data is protected, living as ciphertext at all times. Anchoring files is the process by which data is encrypted and the access rules are embedded alongside the encryption.  Only when users satisfy the access rules are they granted access, thereby allowing them to use the data.


How does Anchor encryption work?

The features of Anchor’s encryption are how we deploy and enforce:

  1. Embedded per file to provide highly granular control that travels with the data. 
  2. Low-level OS driver level efficiently enforces control over the file without user and application level involvement, resulting in zero friction and high performance. 
  3. Dynamic protection of file derivatives results in automating governance and minimizing administration time. 

These cumulative features allow Anchor to be universal, transparent, and unopinionated about the applications that consume protected files, where those files are stored, and how they are shared in a Windows environment.


What makes Anchor Simple, Transparent, and Affordable?

  • Simple: We can be deployed in approximately 45 minutes. Once configured, our control is automated and invisible to users following the access rules.
  • Transparent: We do not require changes to existing user behaviors. Anchor seamlessly works with current technologies making us synergistic to existing security architectures. Anchor runs in the background and does not require the user to interact with encryption.
  • Affordable: We have flexible per-user pricing that is friendly to small and medium-sized businesses (SMB) without big upfront costs.


What does this mean for data security incidents?

If a breach should occur on Anchored data, the exfiltrated files are useless, as they will appear as ciphertext because they are outside the access rules.  Because the data lost during the breach is encrypted, the reporting requirements under any compliance regulation no longer apply.

 



Was this article helpful?

First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.