Encryption with HiCrypt™

Header HiCrypt

Anker

Shh… Strictly confidential!

Do you remember from your childhood days when people talked or wrote in a “secret language” and only a sworn circle could decode the messages? It used to be fun, because you didn’t want everyone to know about confidential things like flirting love affairs, upcoming tests of courage or the odd prank. Today, companies are forced to encrypt important information – either for data protection reasons or because they don’t want criminals to steal sensitive company or customer data.

HiCrypt™ encrypts data on network drives and ensures that only those in possession of the corresponding key can view the confidential data. The software can be installed in a few minutes, runs silently in the background and is very easy to use. In contrast to conventional container encryption solutions, HiCrypt™ even allows several people to access the encrypted shares at the same time.

I’m here for you!

Kristin Löwe-Bulut
Sales IT-Security
vertrieb@digitronic.net
+49 371 815 39 – 0

Kristin Löwe-Bulut
Sales IT-Security
vertrieb@digitronic.net
+49 371 815 39 – 0

Anker

Advantages of HiCrypt™ at a glance:

  • Shared access to encrypted files and folders
  • Key ownership guarantee without back doors
  • Integrated user administration
  • Recovery options in case of disaster
  • Definition of individual password policies is supported
  • Protection of administrators due to decoupled access rights

For whom?

Companies with 5 to 50,000 employees

Healthcare (hospitals, health insurance companies, group practices, …)

Administrations and authorities

Companies with critical infrastructures (CISA)

Anker

Which HiCrypt™ suits you best?

The HiCrypt™ family includes HiCrypt™ Professional and HiCrypt™ Enterprise Services. You decide which one is right for you. In any case: HiCrypt™ can do much more than just classic container encryption.

Feature

HiCrypt™
Professional

HiCrypt™
Enterprise
Services

Container-Verschlüsse-lung*

Working together on encrypted shares

Central rollout and management option

Restoring individual files from a backup

Support of individual password policies

Protection of administrators in case of suspicion

Integrated user administration

Connection to existing user administration without media break

Workflowintegration

Script-based control possible

Central management of all encrypted shares (even without PKI)

Comfortable SSO on encrypted shares

* Applies to most container encryption solutions

Anker

HiCrypt™ protects your company from these risks:

Misuse of data content by e.g. blackmail Trojans (Ransomware)
HiCrypt™ cannot protect against blackmailing encryption of data. However, if blackmail Trojans should additionally steal the data and make it accessible to third parties, HiCrypt™ prevents espionage and misuse because the stolen content cannot be read.

Suspicions of administrative personnel
Since the HiCrypt™ key management is only carried out by persons who are exclusively responsible for the confidentiality of the data contents (e.g. CEO), administrative employees are excluded from suspicion of knowing data contents they are not supposed to know.

Data Theft & Industrial Espionage
Only people who have the appropriate key can view the files encrypted with HiCrypt™. Without the key, you will only see a cryptographic string of characters.

DSGVO & Compliance uncertainties
HiCrypt™ offers a maximum of confidentiality of sensitive data and thus complies 100% with the current DSGVO regulations. HiCrypt™ also resists every audit.

Secure work in the home office

HiCrypt™ encrypts data on network drives and enables shared access to encrypted files and folders. No matter where you access the data from: whether from the company network or via VPN in the home office, with HiCrypt™ you hold the key to the confidentiality of your data in your own hands. It doesn’t matter whether the data is on a Windows share or a WebDAV drive in the cloud.

Bild Homeoffice
Bild Schlüsselalleinbesitzgarantie

Guarantee of unique key ownership

With HiCrypt™ you alone manage the access rights to the encrypted content. You determine who can decrypt the data: whether only you alone or additionally trusted persons. All others have no access to the encrypted information. Even administrators who can prepare the drives to be encrypted for use do not need to have permission to view the sensitive data. This protects administrators in case of suspicion.

Anker

That’s how fast you can protect your sensitive data anywhere, anytime:

Download HiCrypt™

Roll out to the appropriate devices via Group Policy

Setting permissions

encrypt

Test HiCrypt™ now free of charge and without obligation for 30 days.

That’s how fast you can protect your sensitive data anywhere, anytime:

Download HiCrypt™

Roll out to the appropriate devices via Group Policy

Setting permissions

encrypt

Test HiCrypt™ now free of charge and without obligation for 30 days.

Working in common

In contrast to container encryption, network drives encrypted with HiCrypt™ can still be accessed by several people at the same time and can work together with the files stored on them. The prerequisite is, of course, that you grant other users access to your documents.

Embedded user management

An integrated and easy-to-use user management system makes it possible to grant additional users access to the encrypted data in no time at all. The user administration is independent of local or domain user accounts. This enables user administration even without administrative privileges. The security of your data remains in your hands.

Better safe than sorry

Customize HiCrypt™ to your individual security policies for passwords. For example, the logon to the encrypted network drive can be additionally secured by a token. In addition, HiCrypt™ supports the use of a dual control principle for all actions that represent administrative measures for an encrypted network drive.

Further information on HiCrypt™ Professional and HiCrypt™ Enterprise Services can be found in our data sheets:

Anker

Our sales team will be happy to advise you on the use of our encryption solution HiCrypt™ Professional and HiCrypt™ Enterprise Services.

We are available to you by phone at +49 371 81539-0 or by e-mail at vertrieb@digitronic.net. We would also be happy to visit you in person or connect with you via web session.

Our sales team will be happy to advise you on the use of our encryption solution HiCrypt™ Professional and HiCrypt™ Enterprise Services.

We are available to you by phone at +49 371 81539-0 or by e-mail at vertrieb@digitronic.net. We would also be happy to visit you in person or connect with you via web session.

Make a request now:

Newsletter subscription

+ =