conpal LAN Crypt protects your data. You can specify which employees can retrieve which files and folders. Managing the rights is easy and rule-based. The conpal LAN Crypt data-centric encryption solution operates in the background, invisible to the user. The IT staff can manage the solution easily using existing roles and policies. Numerous companies as well as economic and public administration organizations in Germany and throughout the world rely on conpal LAN Crypt. [Find out more]
Thanks to our new tool for exchanging data with external parties, you can also encrypt files based on passwords. The file and password can then be shared with users outside their organization – preferably through seperate channels. These users can then decrypt, edit, and re-send the file. The data isn’t visible in plain text at any time during transport. It can also be stored securely in the cloud or on a file share without operators or administrators having access to it.
Once entered, the password is stored in the key ring and is automatically used by conpal LAN Crypt 2Go when a file encrypted with this key is opened. Working with conpal LAN Crypt 2Go is then transparent – the user does not need to perform any additional steps and can save, move or send the file as usual. The protection remains intact.
For working with your team, you can import the password-based key into your central administration and share it with all or selected employees. This way you ensure that even when working with project teams, everyone can share files conveniently and securely.
This portable encryption function is also part of the new mobile client of conpal LAN Crypt. This enables the exchange of password-based files with users on iPhone, iPad, Android smartphone or tablet.