Technical details
SmartCard slot |
N |
PIN-secured access |
N |
USB port |
Y |
Form factor |
External |
USB version |
3.0 (3.1 Gen 1) |
Chameleon Personal, 256-Bit AES, USB3.0, 360g, Silver
Automatic Encryption
LucidPort’s Chameleon creates an encrypted partition on your computer’s hard drive or USB drive. This partition looks and acts like another drive in the system. Every file and application placed in this drive is automatically encrypted. As long as the Chameleon is plugged in, you can access these files and applications normally. Once the Chameleon is removed, this drive disappears and all access is terminated.
Unlimited Encrypted Data
Unlike flash drives, the encrypted data is not stored on the Chameleon. It remains in your storage device. In the event of a lost Chameleon, your data is still recoverable and remains safe in your computer, external hard drive, or flash drive. You can make the biggest Chameleon drives up to 2TB in size. You can make any number of Chameleon drives on your internal hard disk or on flash drives. There is no limit on how much encrypted data can be created by Chameleon. The limit will only be the size of your flash drive, internal or external hard drive.
Single File Encryption
Chameleon device can encrypt and decrypt individul files and folders. Right click on the file or folder you want to protect, select "Encrypt Here" to create an encrypted version of the selected file.You can send encrypted files as attachments for emails.
Secure the Cloud
Save encrypted files and folders for cloud storage. Drag and drop sensitive files to your network or cloud storage folder. Automatically encrypted, they can be decrypted from any other computer, but only with your Chameleon plugged in.
Hardware Based Endpoint Encryption System
Software encryption solutions require passwords and store encryption keys in memory during runtime. Passwords can be captured by malware, key-loggers and cold boot attacks.
The encryption key never leaves the Chameleon device and does not require a password.
Chameleon takes minutes to set up and presents a straightforward user experience without the hassles and hazards of passwords. Since the files never leave the PC, they are recoverable even if the Chameleon is lost or broken.
Encrypt Applications and Software
Keep your email and web cache safe from prying eyes by installing those applications directly in the encrypted partition. Applications work normally with the Chameleon plugged in. They are fully encrypted when the Chameleon is removed.
Let someone else borrow your computer. Without the Chameleon, your sensitive data stays private. But your computer remains fully operational.