conpal LAN Crypt

Your data is the focal point – and conpal LAN Crypt ensures the necessary protection. The user has the freedom to choose whichever endpoint device is appropriate for their current work situation. They might use a notebook at the workplace, a tablet in a meeting, or a smartphone when they’re on the move. conpal LAN Crypt allows each employee to utilize their protected data consistently – anytime, anywhere.

Your sensitive data is protected – by state-of-the-art security processes and encryption algorithms. According to your requirements, the protection level can even extend up to certified operational environments. Persistent encryption also ensures that your sensitive data stays protected permanently.

Managing the rights is easy – by means of flexible, rule-based policies. In order to rigorously enforce a consistently effective data protection concept, it is generally sufficient to fully define a few generic access rules. These rules can be created efficiently for small teams as well as large organizations of 100,000 users and more.

The encryption takes place in the background – invisible to the user, requiring no change in the way they work. The same goes for existing IT processes – they don’t have to be adapted either.

Compliance is ensured – and as the party responsible for security, you retain full control at all times over the definition of your security rules. Compliance standards can be implemented by consistently applying the “need-to-know” principle. This means IT administrators’ work is not restricted. They can continue to work with the files themselves, as usual, but without having access to the information contained in them.

Secure sharing with external parties conpal LAN Crypt 2Go gives users the ability to encrypt files based on a password. File and password can then be shared with a user outside their organization – preferably via different channels. This user can then decrypt, edit and resend the file. The data cannot be viewed in plain text at any time during transport. It can also be stored securely in the cloud or on a file share without operators or administrators having access to it. Available for Windows, macOS, iOS, Android, and Linux or as an installation-free web portal, it offers a flexible, versatile means of increasing the basic protection of data. conpal LAN Crypt 2Go is free for private users.

Once entered, the password is stored in the key ring and is automatically used by conpal LAN Crypt 2Go when a file encrypted with this key is opened. Working with conpal LAN Crypt 2Go is then transparent – the user does not need to perform any additional steps and can save, move or send the file as usual. The protection remains intact.

For working with your team, you can import the password-based key into your central administration and share it with all or selected employees. This way you ensure that even when working with project teams, everyone can share files conveniently and securely. [Learn more]

Numerous companies as well as economic and public administration organizations in Germany and throughout the world place their trust in conpal LAN Crypt when it comes to protecting their sensitive data.

conpal LAN Crypt

Your data is the focal point – and conpal LAN Crypt ensures the necessary protection. The user has the freedom to choose whichever endpoint device is appropriate for their current work situation. They might use a notebook at the workplace, a tablet in a meeting, or a smartphone when they’re on the move. conpal LAN Crypt allows each employee to utilize their protected data consistently – anytime, anywhere.

Your sensitive data is protected – by state-of-the-art security processes and encryption algorithms. According to your requirements, the protection level can even extend up to certified operational environments. Persistent encryption also ensures that your sensitive data stays protected permanently.

Managing the rights is easy – by means of flexible, rule-based policies. In order to rigorously enforce a consistently effective data protection concept, it is generally sufficient to fully define a few generic access rules. These rules can be created efficiently for small teams as well as large organizations of 100,000 users and more.

The encryption takes place in the background – invisible to the user, requiring no change in the way they work. The same goes for existing IT processes – they don’t have to be adapted either.

Compliance is ensured – and as the party responsible for security, you retain full control at all times over the definition of your security rules. Compliance standards can be implemented by consistently applying the “need-to-know” principle. This means IT administrators’ work is not restricted. They can continue to work with the files themselves, as usual, but without having access to the information contained in them.

Numerous companies as well as economic and public administration organizations in Germany and throughout the world place their trust in conpal LAN Crypt when it comes to protecting their sensitive data.

Would you like to find out more about conpal LAN Crypt?

Just contact us!