utrust data file kv
Convenient, reliable, and secure protection of business-critical data

LAN Crypt File and Folder Encryption

Protect personal, sensitive, and business-critical data from unauthorized access

  • Role-based encryption of sensitive and business-critical data
  • Helps meet various regulatory compliance requirements such as VS-NfD, GDPR, DORA, HIPAA, etc.
  • Enables cross-platform access to encrypted data
  • No changes in your employees’ working routine
  • Password-based encryption for external communication

Delivery Time:

Ask our sales team
Key Benefits

Key Benefits

Icon

Role-based access management for sensitive and business-critical data

Flexible decision on which user groups are allowed to access which kinds of data

Icon

Persistent encryption protects data externally and internally

Protects Data at Rest and Data in Motion. Network management is strictly separated from key management to avoid unlimited data access for network administrators.

Icon

Convenient data access from all platforms and devices

All files are encrypted and decrypted directly at the users’ endpoint, regardless of the storage location.

Details

Details

LAN Crypt File and Folder Encryption – role-based file encryption software

LAN Crypt File and Folder Encryption adds an extra layer of security to your data. Its role-based access rights management enables you to avoid external access (e.g., by attackers or external consultants with administrative rights) and unauthorized internal access (e.g., by network administrators) within your organization. Given that, it is the ideal solution to ensure compliant data management.

The cryptographic keys used to encrypt your data are solely stored in a central database or the key ring at the user’s local machine, so you are 100% independent from the (cloud) providers you may use.

LAN Crypt File and Folder Encryption follow a strict role-split approach: The network administrator can access and manage files, and the security officer manages keys and security policies. This ensures a complete separation of network administration and security management.

LAN Crypt File and Folder Encryption’s 4.2.1 version is VS-NfD approved for ensuring data security in government operations. With this on-premises version, government agencies can ensure that sensitive files and folders are encrypted and protected against unauthorized access, providing an added layer of data integrity and compliance with stringent regulatory standards.

Features

Helps to achieve regulatory compliance

Automatic and transparent file encryption

  • Invisible encryption for the user
  • Does not require changes in the company’s processes or working routines
  • Definition and management of encryption rules set up by the security officer

Separation of roles between administrator and security officer

  • Key management by the security officer
  • Definition of rules for individuals or groups by the security officer
  • System administration remains with the administrator

Cross-platform data access

  • Supports Windows 10, Windows 11, Windows Server, Terminal Server, Citrix XenApp, MacOS, iOS and Android
  • Files are encrypted and decrypted directly at the users’ endpoint regardless of the storage location
  • Allows convenient data access from mobile devices

LAN Crypt 2Go: Secure data sharing with external parties

  • Password-based encryption
  • Encrypted exchange of information – even with external parties
  • Flexibly set a password for files and securely share them externally
  • External parties can decrypt files with the correct password
  • Work with documents as usual
  • Externals also encrypt the file again with the same or a different password
  • Secure data exchange across all platforms (Windows, macOS, iOS, iPadOS, Android, Linux…)

Central database

  • Key management solution (vESKM) optionally applicable
  • For efficient key and rule management
  • Central creation of encryption rules
  • Key and data recovery

Encryption of data in the Cloud

  • Support for Microsoft OneDrive, Microsoft Azure, Dropbox, Google Drive, and more
  • Keys to decrypt the data remain in the local database (fully GDPR-compliant)

Technical Specifications

Supported algorithms

Encryption

  • AES 128 Bit and 256 Bit
  • 3DES 168 Bit
  • DES
  • IDEA 28 Bit
  • XOR

Certificates

  • RSA up to 4096 Bit
  • Self-generated or via involvement of a PKI
  • Softcertificates
  • Smartcards
  • Tokens

Recommended algorithm

  • AES-256

Recommended encryption format

  • XTS-AES
  • Hash
  • MD5
  • SHA256

User authentication via X.509 certificates

  • Import of certificates from an existing PKI infrastructure or signature creation for the certificates by u.trust LAN Crypt itself

On-premise

Our on-premise options allow hosting the product directly on-site in your own network or data center.

  • Software License

Cloud-based management

Manage LAN Crypt File and Folder Encryption from a single dashboard that gives you visibility into devices, users, and other information – a powerful tool for passing compliance audits.
 

Try for free for 30 days
File and Folder Encryption as a Service Explained
 

Related to this product

Bundle 

Full Disk Encryption

Reliable hard disk encryption for laptops with VS-NfD data processing

Find more details

Enterprise Secure Key Manager

The centralized securing and managing solution for the cryptographic keys to your data

Find more details

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.