top of page
pexels-ansel-lee-1635554-4019237.jpg

LAN Crypt
File and Folder Encryption

Convenient, reliable, and secure protection of business-critical data

image.png

Role-based encryption of sensitive and business-critical data

Helps meet various regulatory compliance requirements such as VS-NfD, GDPR, DORA, HIPAA, etc.

Enables cross-platform access to encrypted data

No changes in your employees' working routine 

Password-based encryption for external communication

LAN Crypt File and Folder Encryption enhances your data security with an additional layer of protection. Its role-based access rights management prevents external access (e.g., by attackers or external consultants with administrative rights) and unauthorized internal access (e.g., by network administrators) within your organization, making it an ideal solution for compliant data management.

​

The cryptographic keys used for data encryption are stored exclusively in a central database or the key ring on the user's local machine, ensuring complete independence from any (cloud) providers you may use.

​

LAN Crypt File and Folder Encryption employs a strict role-split approach: the network administrator can access and manage files, while the security officer manages keys and security policies. This ensures a clear separation between network administration and security management.

​

Version 4.2.1 of LAN Crypt File and Folder Encryption is VS-NfD approved, ensuring data security for government operations. This on-premises version allows government agencies to encrypt and protect sensitive files and folders against unauthorized access, providing enhanced data integrity and compliance with stringent regulatory standards.

Key Benefits of
LAN Crypt File and Folder Encryption

Role-based access management for sensitive and business-critical data​

Flexible control over which user groups can access
specific types of data.

Persistent encryption protects data externally and internally

Protects Data at Rest and Data in Motion, with strict separation between network management and key management to prevent unlimited data access by network administrators.

Convenient data access from all platforms and devices

All files are encrypted and decrypted directly at the user’s endpoint, no matter where they are stored.

bottom of page