Protect Your Data with Opal Lock By Fidelity Height

Opal Lock is a desktop application that utilizes Opal SED technology to put the capabilities of hardware-based encryption in your own hands.

Designed to configure and manage built-in hardware-based encryption on compatible drives, Opal Lock provides data protection that cannot be cracked, even if your drive is physically lost or stolen.

Opal Lock Products

Opal Lock’s cutting-edge products offer unmatched protection to safeguard your sensitive information against threats and breaches. With a focus on precision and reliability, our meticulously engineered products offer unmatched protection to address your unique security needs. Browse our suite of solutions and experience the pinnacle of data security today.

OPAL LOCK LITE

Opal Lock Lite offers a user-friendly solution for unlocking USB drives that support the Opal standard and hardware-based encryption. With Opal Lock Lite, you can easily unlock your compatible external USB drives and access your encrypted data securely and efficiently.

OPAL LOCK USB

Opal Lock USB supports all basic functions of Opal Lock. It also includes features such as setting up drive encryption, password protection, unlocking drives, changing passwords, and reverting setup.

OPAL LOCK STANDARD

Opal Lock Standard supports all basic functions of Opal Lock. It includes setting up a pre-boot OS environment for unlocking drives when the boot drive is locked. Setting up drive encryption also includes configuring the pre-boot OS environment on a bootable USB drive.

OPAL LOCK PREMIUM

Opal Lock Premium includes the capability to easily set up and manage multiple drives with a single click. A second password can be created with limited authority. Unlocking drives in the pre-boot OS environment using passwords stored on USB will happen automatically.

About Us

Fidelity Height specializes in software management of TCG self-encrypting drives. We are passionate about engineering streamlined solutions for our customers and providing them with tools to fully utilize their drives’ built-in hardware-based encryption.

Secure. Certified. Verified.

Discover Opal Lock’s range of secure and verified solutions, meticulously designed to meet the highest security and reliability standards. From advanced encryption technologies to robust authentication measures, our solutions ensure your data and assets are protected against unauthorized access. With our comprehensive approach to security and our commitment to continuous innovation, you can trust Opal Lock to safeguard what matters most to you.

Drive Status and Info

Scans and finds the Opal drive(s) on the system, then provides the drive status and information.

Setup

Users can set up a password to lock and unlock drives.

Unlock Drives

After password setup of a drive, user unlocks access to the drive with a pre-OS boot environment set up on the drive or a bootable USB, or by using a separate, unlocked Windows system.

 

Query Drive

View additional information about your drive.

View Audit Log

Access a drive’s event log.

Setup/ Remove User

Set up a second password with limited authority.

USB Password​

Save your password to a USB and use your USB to authenticate.

Revert Setup/Erase

Erase data and get a sanitization certificate.

DRIVE STATUS AND INFO

Scans & finds the Opal drive(s) on the system, then provides the drive status and information.

UNLOCK DRIVES

Scans & finds the Opal drive(s) on the system, then provides the drive status and information.

QUERY DRIVE

Scans & finds the Opal drive(s) on the system, then provides the drive status and information.

UNLOCK DRIVES

Scans & finds the Opal drive(s) on the system, then provides the drive status and information.

Opal Lock Video Gallery

Drive Compatibility

Opal Lock supports both Opal 1.0 , 2.0 and Pyrite 1.0 , 2.0.

Our Blogs

usb flash drive on grass background
Data Protection

How Vulnerable is Your Data if Your USB is Lost?

Remember the security breach incident when an airport staff member lost a USB stick containing sensitive data, including the late Queen’s security and travel arrangements? That’s a dramatic example of the common risk of losing an unencrypted flash drive. If your drive isn’t properly secured, anyone who finds it can

Read More »
data breach
Data Breach

Smart Compliance with Complex Data Breach Laws

As cyberattacks increase in frequency and severity, organizations are under growing pressure to protect sensitive data and act quickly when there is a breach. In 2024, the United States experienced over 3,200 publicly reported data breaches that affected over 350 million individuals, a staggering reminder of the scale of this

Read More »
data privacy
Data Privacy

Protecting Your Data Privacy in a World of Threats

In today’s digital world, data privacy is more than a concern, it’s a necessity. From identity theft to corporate espionage, the risk of sensitive information falling into the wrong hands has never been higher. Relying solely on software-based security measures is no longer enough. Hackers continue to grow more sophisticated,

Read More »
READY TO START YOUR JOURNEY?