Protect Your Data with Opal Lock By Fidelity Height
Opal Lock is a desktop application that utilizes Opal SED technology to put the capabilities of hardware-based encryption in your own hands.
Designed to configure and manage built-in hardware-based encryption on compatible drives, Opal Lock provides data protection that cannot be cracked, even if your drive is physically lost or stolen.
Opal Lock Products
Opal Lock’s cutting-edge products offer unmatched protection to safeguard your sensitive information against threats and breaches. With a focus on precision and reliability, our meticulously engineered products offer unmatched protection to address your unique security needs. Browse our suite of solutions and experience the pinnacle of data security today.
OPAL LOCK LITE
Opal Lock Lite offers a user-friendly solution for unlocking USB drives that support the Opal standard and hardware-based encryption. With Opal Lock Lite, you can easily unlock your compatible external USB drives and access your encrypted data securely and efficiently.
OPAL LOCK USB
Opal Lock USB supports all basic functions of Opal Lock. It also includes features such as setting up drive encryption, password protection, unlocking drives, changing passwords, and reverting setup.
OPAL LOCK STANDARD
Opal Lock Standard supports all basic functions of Opal Lock. It includes setting up a pre-boot OS environment for unlocking drives when the boot drive is locked. Setting up drive encryption also includes configuring the pre-boot OS environment on a bootable USB drive.
OPAL LOCK PREMIUM
Opal Lock Premium includes the capability to easily set up and manage multiple drives with a single click. A second password can be created with limited authority. Unlocking drives in the pre-boot OS environment using passwords stored on USB will happen automatically.
About Us
Fidelity Height specializes in software management of TCG self-encrypting drives. We are passionate about engineering streamlined solutions for our customers and providing them with tools to fully utilize their drives’ built-in hardware-based encryption.
Secure. Certified. Verified.
Discover Opal Lock’s range of secure and verified solutions, meticulously designed to meet the highest security and reliability standards. From advanced encryption technologies to robust authentication measures, our solutions ensure your data and assets are protected against unauthorized access. With our comprehensive approach to security and our commitment to continuous innovation, you can trust Opal Lock to safeguard what matters most to you.
Drive Status and Info
Scans and finds the Opal drive(s) on the system, then provides the drive status and information.
Setup
Users can set up a password to lock and unlock drives.
Unlock Drives
After password setup of a drive, user unlocks access to the drive with a pre-OS boot environment set up on the drive or a bootable USB, or by using a separate, unlocked Windows system.
Query Drive
View additional information about your drive.
View Audit Log
Access a drive’s event log.
Setup/ Remove User
Set up a second password with limited authority.
USB Password
Save your password to a USB and use your USB to authenticate.
Revert Setup/Erase
Erase data and get a sanitization certificate.
DRIVE STATUS AND INFO
Scans & finds the Opal drive(s) on the system, then provides the drive status and information.
UNLOCK DRIVES
Scans & finds the Opal drive(s) on the system, then provides the drive status and information.
QUERY DRIVE
Scans & finds the Opal drive(s) on the system, then provides the drive status and information.
UNLOCK DRIVES
Scans & finds the Opal drive(s) on the system, then provides the drive status and information.
Opal Lock Video Gallery
Video Playlist
Drive Compatibility
Opal Lock supports both Opal 1.0 , 2.0 and Pyrite 1.0 , 2.0.
Our Blogs

Why Healthcare Providers Need Self-Encrypting Drives to Protect Patient Data
When Lives Depend on Data, Security Can’t Be Optional Hospitals save lives every day but behind every diagnosis and treatment lies equally sensitive patient data. From medical histories to lab reports and insurance records, healthcare organizations manage thousands of files daily. Losing that data or allowing it to leak can

Why Banks and Financial Institutions Trust Self-Encrypting Drives (SEDs)
Where Money Meets Data, Security Becomes Everything Walk into any bank today and you’ll see vaults, cameras, and guards everywhere. But the real treasure isn’t in the cash rooms anymore it’s inside hard drives and data centers. Customer details, loan histories, digital transactions, and credit reports all stored in computers

Practical Steps to Secure Business Laptops
The Real Risk: Your Laptop is the Door to Your Business Every business laptop carries more value than its price tag. It holds contracts, client data, passwords, invoices, and strategies that keep your company running. Now imagine losing it. In today’s digital world, that single device can become a gateway