Thousands of laptops are lost or stolen every year. Resulting data breaches have caused untold financial and reputational damage across all industries. Protect your private data with the Chameleon.

Like a key for your computer, the Chameleon protects your information with full AES-256 encryption, the same standard used by the US government and many Fortune 500 companies. Plug in the Chameleon to access your files. Unplug it to secure them. No passwords to remember or hide. The Chameleon guards your data from key-loggers, malware, and hackers even if Windows is not password protected.

Automatic Encryption

LucidPortís Chameleon creates an encrypted partition on your computerís hard drive or USB drive. This partition looks and acts like another drive in the system. Every file and application placed in this drive is automatically encrypted. As long as the Chameleon is plugged in, you can access these files and applications normally. Once the Chameleon is removed, this drive disappears and all access is terminated.

Unlimited Encrypted Data

Unlike flash drives, the encrypted data is not stored on the Chameleon. It remains in your storage device. In the event of a lost Chameleon, your data is still recoverable and remains safe in your computer, external hard drive, or flash drive. You can make the biggest Chameleon drives up to 2TB in size. You can make any number of Chameleon drives on your internal hard disk or on flash drives. There is no limit on how much encrypted data can be created by Chameleon. The limit will only be the size of your flash drive, internal or external hard drive.

Single File Encryption

Chameleon device can encrypt and decrypt individul files and folders. Right click on the file or folder you want to protect, select "Encrypt Here" to create an encrypted version of the selected file.You can send encrypted files as attachments for emails.

Secure the Cloud

Save encrypted files and folders for cloud storage. Drag and drop sensitive files to your network or cloud storage folder. Automatically encrypted, they can be decrypted from any other computer, but only with your Chameleon plugged in.

Hardware Based Endpoint Encryption System

Software encryption solutions require passwords and store encryption keys in memory during runtime. Passwords can be captured by malware, key-loggers and cold boot attacks.

The encryption key never leaves the Chameleon device and does not require a password.

Chameleon takes minutes to set up and presents a straightforward user experience without the hassles and hazards of passwords. Since the files never leave the PC, they are recoverable even if the Chameleon is lost or broken.

Encrypt Applications and Software

Keep your email and web cache safe from prying eyes by installing those applications directly in the encrypted partition. Applications work normally with the Chameleon plugged in. They are fully encrypted when the Chameleon is removed.

Let someone else borrow your computer. Without the Chameleon, your sensitive data stays private. But your computer remains fully operational.


Product Specifications:

Item Number: USB800
Item Description: Chameleon Data Encryption System
Product Dimensions: 2.3 x 0.7 x 0.3 inches (58.0 x 18.0 x 8.0 mm)
Package Dimensions: 6.42 x 5.0 x 1.0 inches (16.3 x 12.5 x 2.3 cm)
Shipping Weight: 1 pound
Interface: USB3.0, USB2.0 & 1.1 compatible, Supports Windows XP, Vista, Win7, Win8, Win8.1 and Win10 based PC
Warranty: Limited Warranty

 

VIDEOS


Chameleon Installation

Chameleon Demonstration

Bypassing Security on Encrypted Drives

Cold Boot Attacks on Encryption Keys

Copy Machines, a Security Risk?