LAN Crypt
File and Folder Encryption
Convenient, reliable, and secure protection of business-critical data
Role-based encryption of sensitive and business-critical data
Helps meet various regulatory compliance requirements such as VS-NfD, GDPR, DORA, HIPAA, etc.
Enables cross-platform access to encrypted data
No changes in your employees' working routine
Password-based encryption for external communication
LAN Crypt File and Folder Encryption enhances your data security with an additional layer of protection. Its role-based access rights management prevents external access (e.g., by attackers or external consultants with administrative rights) and unauthorized internal access (e.g., by network administrators) within your organization, making it an ideal solution for compliant data management.
​
The cryptographic keys used for data encryption are stored exclusively in a central database or the key ring on the user's local machine, ensuring complete independence from any (cloud) providers you may use.
​
LAN Crypt File and Folder Encryption employs a strict role-split approach: the network administrator can access and manage files, while the security officer manages keys and security policies. This ensures a clear separation between network administration and security management.
​
Version 4.2.1 of LAN Crypt File and Folder Encryption is VS-NfD approved, ensuring data security for government operations. This on-premises version allows government agencies to encrypt and protect sensitive files and folders against unauthorized access, providing enhanced data integrity and compliance with stringent regulatory standards.
Key Benefits of
LAN Crypt File and Folder Encryption
Role-based access management for sensitive and business-critical data​
Flexible control over which user groups can access
specific types of data.
Persistent encryption protects data externally and internally
Protects Data at Rest and Data in Motion, with strict separation between network management and key management to prevent unlimited data access by network administrators.
Convenient data access from all platforms and devices
All files are encrypted and decrypted directly at the user’s endpoint, no matter where they are stored.