Our working environment is becoming more and more mobile – meaning that so too is the data we work with. conpal LAN Crypt is available for mobile devices like smartphones and tablets also. The Android app ensures the usual protection for the secure use of your sensitive data in this environment – even on your smartphone or tablet.
You can use files as you usually do – even from your mobile Android device when you’re on the move. In this case, the conpal LAN Crypt app uses the same policies and keys as the desktop apps. This allows you to access, edit, or save your protected files in the same way as you usually can from your desktop or laptop. When needed, files can be de- or encrypted persistently at any time. Also, you can check the encryption status of a file and the keys on its virtual keychain that have been assigned to you.
Switching between the worlds is seamless – mobile, desktop, or laptop. Seamless integration in the system ensures that you can switch from your workplace computer to your mobile device without any disruption. And vice versa of course. Encrypted data can be exchanged with any other conpal LAN Crypt client at any time.
Secure sharing with users outside your organization – the app offers the option to encrypt files with a password. File and password can now be shared with a conpal LAN Crypt user outside their organization. It is recommended to use different channels to increase security. The recipient can then decrypt, edit and resend the file. The data cannot be viewed in plain text at any time during transport. It can also be stored securely in the cloud or on a file share without operators or administrators having access to it. You have the option of saving the password-based keys you used to exchange with existing contacts in the “Key Ring” and conveniently using them again the next time you need them.
Manage distribution and administration centrally, easily, and efficiently – by means of Mobile Device Management (MDM). The conpal LAN Crypt app can be distributed without any problems using common MDM solutions. Likewise, all of the configuration settings can be centrally preset and controlled. This way, the assignment of the default encryption key as well as the policy check can be implemented company-wide via MDM (Mobile Device Management).