File and Folder Encryption as a Service
Simplified file encryption – centrally managed in the Cloud

File and Folder Encryption as a Service

Enable the encryption strategy for your business in an instant

Protecting sensitive data has never been easier: LAN Crypt Cloud helps you implement complete file and folder encryption in your organization. First define the assets and locations to be protected - then use access management to allocate permissions. The role-based user management makes it easy to onboard new employees, so you don't have to create a whole new profile for each user. Benefit from:

  • Easy setup in less than 15 minutes
  • Role-based encryption of sensitive and business-critical data
  • Protection against unauthorized internal and external data access
  • Fulfillment of individual security policies and compliance rules
  • Cross-platform and transparent data access

Start your 30-day free trial today

Product Type:


Delivery Time:

Key Benefits

Key Benefits


Fast and Easy Setup

After registering on the Cloud platform, administration and setup are user-friendly, even for administrators without technical expertise. The service can be operational in less than 15 minutes, ensuring a quick and seamless transition to operational efficiency.


Role-based Encryption

All company data is securely encrypted and can only be accessed and decrypted by users with corresponding access rights. This ensures confidentiality and integrity, even when data is stored in the cloud.


30-day Free Trial

Experience the power of our file and folder encryption solution with a complimentary 30-day free trial. Gain hands-on access to our product's capabilities and experience how it effortlessly secures your data.


Compliance for GDPR and cross-platform data protection

utrust lancrypt cloud screen mockup with detail

Achieve compliance for GDPR and similar data protection regulations

Whether GDPR, ISO 27001, NIS2, or HIPAA: Integrating LAN Crypt into corporate processes makes certification and compliance easier for you. Manage your data protection policies from a single dashboard that gives you visibility into devices, users, and other information – a powerful tool for simpli-fying compliance audits.

Cross-platform data protection

Client-side encryption protects your data everywhere: on cloud platforms like OneDrive, Google Drive, and others, as well as on local servers, hard drives, mobile devices, and removable media. Experience peace of mind knowing that encryption occurs seamlessly in the background for employees, eliminating the need for complex workflows.

Easy administration of access rights and encryption rules

The easy administration concept allows you to set up your environment in just three steps:

  • 1. Define assets to be protected
  • 2. Define identities for your users
  • 3. Distribute access permissions

Try File and Folder Encryption as a Service free for 30 days 

utrust lancrypt cloud screen mockup with detail
Sign in with Microsoft

Sign in with Microsoft

For a centralized and seamless sign-in, File and Folder Encryption as a Service offers users the possibility to connect their accounts to their organization's Microsoft account. The 'Sign in with Microsoft feature' provides a simple, secure way to sign into LAN Crypt File and Folder Encryption using a Microsoft account. Administrators can define which account users must use to log in to the LAN Crypt service - their LAN Crypt account or their Microsoft account.

Price models

File and Folder Encryption as a Service - Flexible licensing to fit your use case

LAN Crypt File and Folder Encryption App for Desktop and Mobile: Windows, macOS, Linux, Android, iOS
Central key management in the cloud admin 
MS Entra ID / Azure Active Directory integration 
Device synchronization for password generated keys 
Cloud backup for password generated keys 
(per user / month)
(per user / month)
(per user / month)

The path to easy-to-use file encryption starts here

Technical Specifications

Technical Requirements

Client 64 Bit

  • Windows 10 Pro/Enterprise 
        1809 (LTSC) 
        21H2 (LTSC) 
  • Windows 11 Pro/Enterprise 
        21H2 and 22H2 
  • Windows Server 
  • Supported Citrix Environments 
    Citrix Virtual Apps and Desktop 7 1912 LTSR CU2 on WS 2019 
  • macOS 
    10.15 Catalina 
    11 Big Sur (M1 & Intel) 
    12 Monterey 
    13 Ventura

Administration 64 Bit

  • Windows 10 Pro/Enterprise* 
  • Windows 11 Pro/Enterprise* 
  • Windows Server*

Mobile Operating Systems

  • Android 10, 11, 12, 13 
  • iOS / iPadOS 15, 16

Supported Media and Platforms

  • Media 
        Network drives 
        Local hard disks 
        CD / DVD 
        Flash drives 
        Memory cards 
  • Platforms 
        Microsoft Terminal Server 
        Virtual Machines 
        Azure SQL 
        Google Drive 
        MS Azure (e.g., Clients, Azure, DB)

Supported Databases

  • Microsoft SQL Server 
  • Oracle Database 

Supported Algorithms

  • Encryption 
        AES 128 Bit and 256 Bit 
        3DES 168 Bit 
        IDEA 28 Bit 
  • Certificates 
        RSA up to 4096 Bit 
        Self-generated or via PKI 
        Soft certificates 
  • Recommended algorithm 
  • Recommended encryption format 
  • Hash 

* See client versions for supported versions

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail


      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.