Protect personal, sensitive, and business-critical data from unauthorized access
- Role-based encryption of sensitive and business-critical data
- Helps meet various regulatory compliance requirements such as VS-NfD, GDPR, DORA, HIPAA, etc.
- Enables cross-platform access to encrypted data
- No changes in your employees’ working routine
- Password-based encryption for external communication
Key Benefits
Details
LAN Crypt File and Folder Encryption – role-based file encryption software
LAN Crypt File and Folder Encryption adds an extra layer of security to your data. Its role-based access rights management enables you to avoid external access (e.g., by attackers or external consultants with administrative rights) and unauthorized internal access (e.g., by network administrators) within your organization. Given that, it is the ideal solution to ensure compliant data management.
The cryptographic keys used to encrypt your data are solely stored in a central database or the key ring at the user’s local machine, so you are 100% independent from the (cloud) providers you may use.
LAN Crypt File and Folder Encryption follow a strict role-split approach: The network administrator can access and manage files, and the security officer manages keys and security policies. This ensures a complete separation of network administration and security management.
LAN Crypt File and Folder Encryption’s 4.2.1 version is VS-NfD approved for ensuring data security in government operations. With this on-premises version, government agencies can ensure that sensitive files and folders are encrypted and protected against unauthorized access, providing an added layer of data integrity and compliance with stringent regulatory standards.
Features
Helps to achieve regulatory compliance
- Fulfill the regulatory compliance requirement worldwide
- In EU: GDPR, NIS2, DORA
- Germany: VS-NfD, TISAX, KHZG
- USA: CCPA, HIPAA, Executive Order on Improving the Nation's Cybersecurity
- Asia: Philippines Data Privacy Act of 2012, PDPA in Singapore
Automatic and transparent file encryption
- Invisible encryption for the user
- Does not require changes in the company’s processes or working routines
- Definition and management of encryption rules set up by the security officer
Separation of roles between administrator and security officer
- Key management by the security officer
- Definition of rules for individuals or groups by the security officer
- System administration remains with the administrator
Cross-platform data access
- Supports Windows 10, Windows 11, Windows Server, Terminal Server, Citrix XenApp, MacOS, iOS and Android
- Files are encrypted and decrypted directly at the users’ endpoint regardless of the storage location
- Allows convenient data access from mobile devices
LAN Crypt 2Go: Secure data sharing with external parties
- Password-based encryption
- Encrypted exchange of information – even with external parties
- Flexibly set a password for files and securely share them externally
- External parties can decrypt files with the correct password
- Work with documents as usual
- Externals also encrypt the file again with the same or a different password
- Secure data exchange across all platforms (Windows, macOS, iOS, iPadOS, Android, Linux…)
Central database
- Key management solution (vESKM) optionally applicable
- For efficient key and rule management
- Central creation of encryption rules
- Key and data recovery
Encryption of data in the Cloud
- Support for Microsoft OneDrive, Microsoft Azure, Dropbox, Google Drive, and more
- Keys to decrypt the data remain in the local database (fully GDPR-compliant)
Technical Specifications
Supported algorithms
Encryption
- AES 128 Bit and 256 Bit
- 3DES 168 Bit
- DES
- IDEA 28 Bit
- XOR
Certificates
- RSA up to 4096 Bit
- Self-generated or via involvement of a PKI
- Softcertificates
- Smartcards
- Tokens
Recommended algorithm
- AES-256
Recommended encryption format
- XTS-AES
- Hash
- MD5
- SHA256
User authentication via X.509 certificates
- Import of certificates from an existing PKI infrastructure or signature creation for the certificates by u.trust LAN Crypt itself
On-premise
Our on-premise options allow hosting the product directly on-site in your own network or data center.
- Software License
Cloud-based management
Manage LAN Crypt File and Folder Encryption from a single dashboard that gives you visibility into devices, users, and other information – a powerful tool for passing compliance audits.
Try for free for 30 days
File and Folder Encryption as a Service Explained