utrust data file kv
Convenient, reliable, and secure protection of business-critical data

u.trust LAN Crypt

Available as: As a service

u.trust LAN Crypt - Protect personal, sensitive and business-critical data from unauthorized access

u.trust Data File Screen
  • Role-based encryption of sensitive and business critical data
  • Supports handling of personal data compliant to GDPR and other regulations
  • Enables cross-platform access to encrypted data
  • No changes in your employees’ working routine
  • Password-based encryption for external communication
Key Benefits

Key Benefits


Role-based access management for sensitive and business-critical data

Flexibly decide which user groups are allowed to access which kinds of data. 


Persistent encryption protects data externally and internally

Protects Data at Rest and Data in Motion. Network management is strictly separated from key management to avoid unlimited data access for network administrators.


Convenient data access from all platforms and devices

All files are encrypted and decrypted directly at the users’ endpoint regardless of the storage location.



u.trust LAN Crypt – role-based file encryption software

u.trust LAN Crypt adds the extra-layer of security to your data. With its role-based access rights management it enables you to avoid external access (e. g. by attackers or external consultants with administrative rights) as well as unauthorized internal access (e. g. by network administrators) within your organization. Given that, it is the ideal solution to ensure compliant data man-agement.

The cryptographic keys used to encrypt your data are solely stored in a central data base or in the key ring at the users’ local machine so you are 100% inde-pendent from the (cloud) providers you may use.

On top, u.trust LAN Crypt follows a strict role split approach: The network administrator can access and manage files and the security officer manages keys and security policies. This ensures a complete separation of network administration and security management.


Automatic and transparent file encryption

  • Invisible encryption for the user
  • Does not require changes in the company’s processes or working routines
  • Definition and management of encryption rules set up by the security officer

Separation of roles between administrator and security officer

  • Key management by the security officer
  • Definition of rules for individuals or groups by the security officer
  • System administration remains with the administrator

Cross-platform data access

  • Supports Windows 10, Windows 11, Windows Server, Terminal Server, Citrix XenApp, MacOS, iOS and Android
  • Files are encrypted and decrypted directly at the users’ endpoint regardless of the storage location
  • Allows convenient data access from mobile devices

u.trust LAN Crypt 2Go: Secure data sharing with external parties

  • Password-based encryption
  • Encrypted exchange of information – even with external parties
  • Flexibly set a password for files and securely share them externally
  • External parties can decrypt files with the correct password
  • Work with documents as usual
  • Externals also encrypt the file again with the same or a different password
  • Secure data exchange across all platforms (Windows, macOS, iOS, iPadOS, Android, Linux…)

Central database

  • Key management solution (vESKM) included
  • For efficient key and rule management
  • Central creation of encryption rules
  • Key and data recovery

Encryption of data in the Cloud

  • Support for Microsoft OneDrive, Microsoft Azure, Dropbox, Google Drive, and more
  • Keys to decrypt the data remain in the local database (fully GDPR-compliant)

Technical Specifications

Supported algorithms


  • AES 128 Bit and 256 Bit
  • 3DES 168 Bit
  • DES
  • IDEA 28 Bit
  • XOR


  • RSA up to 4096 Bit
  • Self-generated or via involvement of a PKI
  • Softcertificates
  • Smartcards
  • Tokens

Recommended algorithm

  • AES-256

Recommended encryption format

  • Hash
  • MD5
  • SHA256

User authentication via X.509 certificates

  • Import of certificates from an existing PKI infrastructure or signature creation for the certificates by u.trust LAN Crypt itself


Our on-premise options allow hosting the product directly on-site in your own network or data center.

  • Software License

Cloud-based management

Manage u.trust LAN Crypt from a single dashboard that gives you visibility into devices, users, and other information – a powerful tool for passing compliance audits.

u.trust LAN Crypt 2Go
Try for free for 30 days
u.trust LAN Crypt Cloud Explained

Related to this product



Reliable hard disk encryption for laptops with VS-NfD data processing

Find more details


The root of trust for generation, storage, and usage of your data encryption keys inside the tamper protected HSM

Find more details

Enterprise Secure Key Manager (ESKM)

The centralized securing and managing solution for the cryptographic keys to your data

Find more details

u.trust Identify

The PKI solution bridging the gap between digital key material and identities enabling provable data integrity

Find more details

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more.