{"id":5012,"date":"2021-11-09T18:25:52","date_gmt":"2021-11-09T17:25:52","guid":{"rendered":"https:\/\/www.digitronic.net\/?page_id=5012"},"modified":"2026-03-05T13:51:55","modified_gmt":"2026-03-05T12:51:55","slug":"encryption","status":"publish","type":"page","link":"https:\/\/www.digitronic.net\/en\/encryption\/","title":{"rendered":"Encryption"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column el_class=&#8221;bild&#8221;][vc_single_image image=&#8221;7991&#8243; img_size=&#8221;full&#8221;][\/vc_column][\/vc_row][vc_section][vc_row][vc_column width=&#8221;4\/5&#8243;][vc_column_text el_id=&#8221;contact&#8221; el_class=&#8221;anker&#8221;]Anker[\/vc_column_text][vc_column_text]<\/p>\n<h1>Reliable data encryption with HiCrypt\u2122<\/h1>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1705051722504{margin-bottom: 20px !important;}&#8221;]<span data-contrast=\"auto\">Unencrypted data is a risk for your company on several levels. For example, data can be stolen by criminals or misused internally by unauthorised individuals. Administrators in particular often feel exposed to the general suspicion that they can see everything in the company.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Therefore, ensure more digital privacy in your company now! <strong>HiCrypt\u2122<\/strong> not only protects your company data externally, but also develops access management for your fellow employees under their own responsibility, even independently of the IT administration.<\/span><\/p>\n<p><span class=\"TextRun SCXW88841324 BCX9\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW88841324 BCX9\">Use <\/span><strong><span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">HiCrypt<\/span><span class=\"NormalTextRun SCXW88841324 BCX9\">\u2122 <\/span><\/strong><span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">to<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">encrypt<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">data<\/span><span class=\"NormalTextRun SCXW88841324 BCX9\"> on network <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">drives<\/span><span class=\"NormalTextRun SCXW88841324 BCX9\"> (<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">or<\/span><span class=\"NormalTextRun SCXW88841324 BCX9\"> UNC-<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">mounted<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">folders<\/span><span class=\"NormalTextRun SCXW88841324 BCX9\">) and <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">ensure<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">that<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">only<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">the<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">group<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">of<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">people<\/span><span class=\"NormalTextRun SCXW88841324 BCX9\"> in <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">possession<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">of<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">the<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">corresponding<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">key<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">can<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">view<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">the<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">confidential<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">data<\/span><span class=\"NormalTextRun SCXW88841324 BCX9\">. <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">No<\/span><span class=\"NormalTextRun SCXW88841324 BCX9\"> additional <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">training<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">process<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">is<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">required<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">for<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">users<\/span><span class=\"NormalTextRun SCXW88841324 BCX9\">, <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">as<\/span> <strong><span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">HiCrypt<\/span><span class=\"NormalTextRun SCXW88841324 BCX9\">\u2122 <\/span><\/strong><span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">runs<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">completely<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">invisibly<\/span><span class=\"NormalTextRun SCXW88841324 BCX9\"> in <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">the<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">background<\/span><span class=\"NormalTextRun SCXW88841324 BCX9\"> so <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">that<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">they<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">can<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">continue<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">to<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">work<\/span><span class=\"NormalTextRun SCXW88841324 BCX9\"> in <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">their<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">familiar<\/span><span class=\"NormalTextRun SCXW88841324 BCX9\"> Windows <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW88841324 BCX9\">environment.<\/span><\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;ansprechpartner&#8221;][vc_column_text el_class=&#8221;gruen_weiss&#8221;]<\/p>\n<p style=\"text-align: center;\"><strong>I&#8217;m here for you!<\/strong><\/p>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<img decoding=\"async\" class=\"wp-image-9745 size-full aligncenter\" src=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-scaled.jpg\" alt=\"\" width=\"2560\" height=\"2560\" srcset=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-scaled.jpg 2560w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-300x300.jpg 300w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-1024x1024.jpg 1024w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-150x150.jpg 150w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-768x768.jpg 768w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-1536x1536.jpg 1536w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-2048x2048.jpg 2048w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-1200x1200.jpg 1200w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1767798690540{margin-bottom: 50px !important;background-color: #f7f7f7 !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\"><strong>Alexander Woeschka<\/strong><br \/>\nManaging Director<br \/>\n<a class=\"later\" href=\"tel:+4937181539444\">+49 371 815 39-444<\/a><br \/>\n<a class=\"later\" href=\"mailto:sales@digitronic.net\">sales@digitronic.net<\/a><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section css=&#8221;.vc_custom_1635847672356{margin-top: 50px !important;}&#8221;][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1635847665787{background-color: #f1f1f3 !important;}&#8221;][vc_column css=&#8221;.vc_custom_1635847736596{margin-top: -30px !important;}&#8221;][vc_column_text]<\/p>\n<h3 style=\"text-align: center;\">Download directly here and test free of charge for 30 days:<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;download_button&#8221;]<\/p>\n<p style=\"text-align: center;\"><a href=\"#info\">Download<\/a><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_row][vc_column][vc_column_text]<span class=\"TextRun SCXW135442204 BCX9\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><strong><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">HiCrypt<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\">\u2122 <\/span><\/strong><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">is<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\"> ideal <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">for<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">implementing<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\"> legal <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">requirements<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\"> in <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">accordance<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">with<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\"> European GDPR <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">standards<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\">, ISO 27001, <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">TiSax<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\"> and NIS-2. <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">Of<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">course<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\">, <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">you<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">can<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\"> also <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">secure<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\"> sensitive <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">data<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">from<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">groups<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">worthy<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">of<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">protection<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\"> in <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">accordance<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">with<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">the<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\"> Whistleblower <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">Protection<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\"> Act. This <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">makes<\/span> <strong><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">HiCrypt<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\">\u2122 <\/span><\/strong><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">the<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\"> ideal <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">solution<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">for<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\"> network <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">drive<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">encryption<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">for<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">companies in critical infrastructure<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\"> and all <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">companies<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">that<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">protect<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">data<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\"> in <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">their<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\"> HR, <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">administration<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">or<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">finance<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135442204 BCX9\">departments<\/span><span class=\"NormalTextRun SCXW135442204 BCX9\">.<\/span><\/span><span class=\"EOP SCXW135442204 BCX9\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_column_text el_class=&#8221;gruen&#8221;]<\/p>\n<h3 style=\"text-align: center;\"><i class=\"fas fa-video-camera\"><\/i> <a style=\"text-decoration: underline;\" href=\"#video\">Product videos<\/a><\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_column_text el_class=&#8221;gruen&#8221;]<\/p>\n<h3 style=\"text-align: center;\"><i class=\"fas fa-check\"><\/i> <a style=\"text-decoration: underline;\" href=\"#advantages\">Advantages<\/a><\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_column_text el_class=&#8221;gruen&#8221;]<\/p>\n<h3 style=\"text-align: center;\"><i class=\"fas fa-vial\"><\/i> <a style=\"text-decoration: underline;\" href=\"#case_study\">Case study<\/a><\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_column_text el_class=&#8221;gruen&#8221;]<\/p>\n<h3 style=\"text-align: center;\"><i class=\"fas fa-info\"><\/i> <a style=\"text-decoration: underline;\" href=\"#info\">Technical info<\/a><\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_section css=&#8221;.vc_custom_1593069872902{margin-top: 30px !important;}&#8221;][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1635855994730{background-color: #f1f1f3 !important;}&#8221;][vc_column][vc_column_text el_id=&#8221;case_study&#8221; el_class=&#8221;anker&#8221;]Anker[\/vc_column_text][vc_column_text]<\/p>\n<h2>Practical example: Saarland Police Medical Service<\/h2>\n<p>[\/vc_column_text][vc_column_text]<span style=\"color: #d7d7d7; font-size: 34px;\"><i class=\"fas fa-quote-left\"><\/i><\/span> <em>There is no absolute security, but we have done everything possible for it. HiCrypt\u2122 ensures that police officers&#8217; medical data can be managed securely and is only accessible to authorized persons.<\/em><\/p>\n<p style=\"text-align: right; font-size: 10px;\">Kr\u00e4mer, person responsible for the technical implementation<em>, Medical Service Police Saarland<\/em><\/p>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;gruen&#8221;]<\/p>\n<h3 style=\"text-align: center;\"><i class=\"fas fa-book\"><\/i> <a href=\"\/files\/Case_Study_Medizinischer_Dienst_Polizei_Saarland.pdf\" target=\"_blank\" rel=\"noopener\">Read the case study now!<\/a><\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section css=&#8221;.vc_custom_1593069872902{margin-top: 30px !important;}&#8221;][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text el_id=&#8221;video&#8221; el_class=&#8221;anker&#8221;]Anker[\/vc_column_text][vc_column_text]<\/p>\n<h2>How HiCrypt\u2122 works &#8211;<br \/>\nsimply explained!<\/h2>\n<p>(German)[\/vc_column_text][vc_column_text]<strong>Secure and user-friendly:<\/strong>\u00a0With HiCrypt\u2122, there is no change to the way users are accustomed to working. Documents are automatically encrypted and decrypted depending on permissions.[\/vc_column_text][vc_video link=&#8221;https:\/\/www.youtube.com\/watch?v=h4jrh81OI4k&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h2>Produktvideo &#8211; So sch\u00fctzt HiCrypt\u2122 Ihr Unternehmen<\/h2>\n<p>(German)[\/vc_column_text][vc_column_text]<strong>More than just encryption:<\/strong> Various features cover different use cases and bring both security and convenience to your employees&#8217; workstations.[\/vc_column_text][vc_video link=&#8221;https:\/\/www.youtube.com\/watch?v=LHRIVR_RdeQ&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section css=&#8221;.vc_custom_1636378265554{margin-top: 30px !important;}&#8221;][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1671731050883{margin-bottom: 0px !important;background-color: #97be0d !important;}&#8221; el_class=&#8221;gruen_weiss&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;anker&#8221; el_id=&#8221;advantages&#8221;]Anker[\/vc_column_text][vc_column_text]<\/p>\n<h2>Advantages of HiCrypt\u2122 at a glance:<\/h2>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>Encryption service for endpoints &amp; terminal servers<\/li>\n<li>Various file servers are supported, such as Windows Server, SAMBA, Synology NAS, QNAP NAS and many more<\/li>\n<li>Also protects data in online storage (DropBox, Google, etc.)<\/li>\n<li>Enables decentralized team access, even worldwide &amp; on the road<\/li>\n<li>Can be fully integrated into existing environments, no training required for end users<\/li>\n<li>Separation of powers &amp; key ownership guarantee without backdoors<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h2>For whom?<\/h2>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-users&#8221; color=&#8221;white&#8221; align=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]SMEs and industrial companies that store <a href=\"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/\" target=\"_blank\" rel=\"noopener\">confidential data<\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-heartbeat&#8221; color=&#8221;white&#8221; align=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]Healthcare (hospitals, health insurance companies, group practices,&#8230;)[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-building&#8221; color=&#8221;white&#8221; align=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid\">\n<div class=\"wpb_column vc_column_container vc_col-sm-9\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p>Administrations and authorities<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-exclamation&#8221; color=&#8221;white&#8221; align=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]Companies with critical infrastructures (CRITIS)[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;dreieck_unten&#8221; css=&#8221;.vc_custom_1636378204543{padding-bottom: 20px !important;}&#8221;][vc_column][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1635851895295{margin-top: 30px !important;}&#8221;][vc_row][vc_column][vc_column_text css=&#8221;.vc_custom_1647436266664{margin-bottom: 30px !important;}&#8221;]<\/p>\n<h2>HiCrypt\u2122 protects your company from these threats:<\/h2>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-shield-alt&#8221; color=&#8221;custom&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; custom_color=&#8221;#97be0d&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Misuse of data content<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-user-secret&#8221; color=&#8221;custom&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; custom_color=&#8221;#97be0d&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Data theft &amp; industrial espionage<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-user-shield&#8221; color=&#8221;custom&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; custom_color=&#8221;#97be0d&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Suspicions of personnel working administratively<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-balance-scale&#8221; color=&#8221;custom&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; custom_color=&#8221;#97be0d&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">DSGVO &amp; compliance uncertainties<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1647436582761{margin-top: 30px !important;background-color: #f1f1f3 !important;}&#8221;][vc_row][vc_column][vc_column_text css=&#8221;.vc_custom_1647436614852{margin-bottom: 30px !important;}&#8221;]<\/p>\n<h2>What is confidential data?<\/h2>\n<p>[\/vc_column_text][vc_column_text]You can find out more about what confidential data is and why the usual Windows tools are usually not enough to protect it from espionage and misuse in our blog post on &#8220;Encryption as a central component of IT security&#8221;.[\/vc_column_text][vc_column_text el_class=&#8221;gruen&#8221;]<\/p>\n<h3 style=\"text-align: center;\"><i class=\"fas fa-book\"><\/i> <a href=\"https:\/\/www.digitronic.net\/en\/encryption-as-a-central-component-of-it-security\/\" target=\"_blank\" rel=\"noopener\">Read blog post now!<\/a><\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section css=&#8221;.vc_custom_1635856278383{margin-top: 50px !important;}&#8221;][vc_row][vc_column][vc_column_text el_id=&#8221;info&#8221; el_class=&#8221;anker&#8221;]Anker[\/vc_column_text][vc_column_text]<\/p>\n<h2>HiCrypt\u2122 &#8211; All important information<\/h2>\n<p>[\/vc_column_text][vc_tta_tabs][vc_tta_section title=&#8221;DOWNLOAD&#8221; tab_id=&#8221;1634217626939-8693a53b-5578&#8243;][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text]Download the latest version of <strong>HiCrypt\u2122 Professional<\/strong> here.<\/p>\n<p><strong>Did you already know?<\/strong> As a new customer you can test the encryption solution free of charge and without obligation for 30 days. After 30 days the license will expire automatically, you don&#8217;t have to care about anything else, unless you want to renew or buy the software. In that case, please just contact our <a href=\"mailto:sales@digitronic.net\">sales team<\/a>.[\/vc_column_text][vc_column_text]If you register with us now as a new prospective customer, you will ensure the following benefits during the trial period:<\/p>\n<p>\u2713 Excellent <strong>support<\/strong> from our friendly staff.<br \/>\n\u2713 Free <strong>advice<\/strong> from our IT security experts[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;download_button&#8221;]<a href=\"https:\/\/www.digitronic.net\/en\/downloads\/\">Download HiCrypt\u2122<\/a>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;download_fenster&#8221; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h5><em><b>Product Key version<\/b><\/em><\/h5>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<strong>Filename:<\/strong> HiCrypt.exe<br \/>\n<strong>Size:<\/strong> 8,42 MB<br \/>\n<strong>Version:<\/strong> 2.4.9<br \/>\n<strong>Published on:<\/strong> August 13th 2024[\/vc_column_text][vc_column_text]<\/p>\n<h5><em><b>Floating version<\/b><\/em><\/h5>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<strong>Filename:<\/strong> HiCrypt.msi<br \/>\n<strong>Size:<\/strong> 8,74 MB<br \/>\n<strong>Version:<\/strong> 2.4.9<br \/>\n<strong>Published on:<\/strong> August 13th 2024[\/vc_column_text][vc_separator][vc_column_text]<strong>Additional downloads:<\/strong><\/p>\n<p><a href=\"https:\/\/hicrypt.com\/download\/hicrypt_ReadMe1st_en.txt\" target=\"_blank\" rel=\"noopener\">Read-Me-First<\/a><br \/>\n<a href=\"https:\/\/hicrypt.com\/download\/hicrypt_howto_en.pdf\" target=\"_blank\" rel=\"noopener\">Step by Step instructions<\/a><br \/>\n<a href=\"https:\/\/hicrypt.com\/download\/hicrypt-floating.zip\" target=\"_blank\" rel=\"noopener\">HiCrypt (Floating)<\/a><br \/>\n<a href=\"https:\/\/hicrypt.com\/download\/hicrypt_floating_license_howto_en.pdf\" target=\"_blank\" rel=\"noopener\">HiCrypt Floating instructions<\/a><br \/>\n<a href=\"https:\/\/hicrypt.com\/download\/hicrypt_addon_yubikey_en.pdf\" target=\"_blank\" rel=\"noopener\">How to use YubiKey 5 with HiCrypt<\/a>[\/vc_column_text][vc_separator][vc_column_text]<a href=\"\/files\/Fact-Sheet-HiCrypt_ENG.pdf\" target=\"_blank\" rel=\"noopener\">FACT SHEET<\/a><br \/>\n<a href=\"https:\/\/hicrypt.com\/en\/faq\/\" target=\"_blank\" rel=\"noopener\">FAQ\u00a0<\/a><br \/>\n<a href=\"https:\/\/hicrypt.com\/en\/release_notes\/\" target=\"_blank\" rel=\"noopener\">RELEASE NOTES<\/a>[\/vc_column_text][vc_hoverbox image=&#8221;5760&#8243; primary_title=&#8221;&#8221; hover_title=&#8221;All-in-one-package for your information and data security&#8221; hover_btn_title=&#8221;Learn more&#8221; hover_btn_style=&#8221;outline-custom&#8221; hover_btn_outline_custom_color=&#8221;#97be0d&#8221; hover_btn_outline_custom_hover_background=&#8221;#d6d6d6&#8243; hover_btn_outline_custom_hover_text=&#8221;#ffffff&#8221; hover_btn_shape=&#8221;square&#8221; hover_add_button=&#8221;true&#8221; hover_btn_link=&#8221;url:%2Fen%2Fall-in-one-compliance-packages%2F|target:_blank&#8221;]For even more protection, our HiCrypt\u2122 encryption solution is also available as an all-in-one compliance package in conjunction with our SmartLogon\u2122 2-factor authentication, including hardware, installation support, maintenance and support. This gives you all-round protection for your data from a single source, direct from the manufacturer.[\/vc_hoverbox][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Features&#8221; tab_id=&#8221;1634217734679-5f4a52fd-c52a&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-lock&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css=&#8221;.vc_custom_1635859866067{margin-top: 30px !important;}&#8221; custom_color=&#8221;#97be0d&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;.vc_custom_1636375498890{margin-bottom: 30px !important;}&#8221;]<strong>Reliable encryption of sensitive information<\/strong><\/p>\n<p>HiCrypt\u2122 encrypts data on network drives and enables convenient and secure teamwork. The encryption and decryption of files takes place directly on the PC in the familiar user environment. This means that both the data transfer to the storage location and the file storage itself are encrypted and only authorized persons can view the information.\u00a0The data is encrypted using standardized, recognized encryption methods. More detailed information on the algorithms used <a href=\"#1634217627756-1fa3851c-b854\">can be found here<\/a>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-key&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css=&#8221;.vc_custom_1635931251115{margin-top: 30px !important;}&#8221; custom_color=&#8221;#97be0d&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;.vc_custom_1636375533373{margin-bottom: 30px !important;}&#8221;]<strong>Key possession guarantee without a back door<\/strong><\/p>\n<p>Our promise as a certified manufacturer of IT security solutions: With HiCrypt\u2122, you alone manage the access permissions to the encrypted data. You decide who from your company can decrypt the data. Neither we nor anyone else but you has control over the key information to the protected data. This is your key-ownership guarantee![\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-user-friends&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css=&#8221;.vc_custom_1635931526728{margin-top: 30px !important;}&#8221; custom_color=&#8221;#97be0d&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;.vc_custom_1636375556287{margin-bottom: 30px !important;}&#8221;]<strong>Working together in a familiar environment<\/strong><\/p>\n<p>Unlike conventional container encryption solutions, HiCrypt\u2122 still allows several people to access encrypted network drives simultaneously &#8211; provided, of course, that they have the appropriate access rights. Since HiCrypt\u2122 is simply displayed as another network drive in Explorer, there is no change to the familiar working environment for your employees.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-user-plus&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css=&#8221;.vc_custom_1635931684307{margin-top: 30px !important;}&#8221; custom_color=&#8221;#97be0d&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;.vc_custom_1636375894683{margin-bottom: 30px !important;}&#8221;]<strong>Integrated user management for flexible assignment of rights<\/strong><\/p>\n<p>Integrated user management allows additional users to be granted access to the encrypted content &#8211; independent of local or domain user accounts. This enables user administration even without administrative privileges. The security of your data thus remains in your hands.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-cloud-upload-alt&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css=&#8221;.vc_custom_1635931863329{margin-top: 30px !important;}&#8221; custom_color=&#8221;#97be0d&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;.vc_custom_1636376374736{margin-bottom: 30px !important;}&#8221;]<strong>HiCrypt\u2122 in the cloud<\/strong><\/p>\n<p>With HiCrypt\u2122, you can also store your data securely from unauthorized access in the cloud and share it with your colleagues or customers as needed. Terminal server services can also be further qualified and made more secure by HiCrypt\u2122. The highest DSGVO compliance is achieved, as no information is stored unencrypted with external service providers. By supporting terminal server environments, HiCrypt\u2122 can be used for any variation of Desktop as a Service (DaaS) applications.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-life-ring&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css=&#8221;.vc_custom_1635932054703{margin-top: 30px !important;}&#8221; custom_color=&#8221;#97be0d&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;.vc_custom_1636376465299{margin-bottom: 30px !important;}&#8221;]<strong>Emergency recovery options (disaster recovery)<\/strong><\/p>\n<p>HiCrypt\u2122 offers several options for repairing network drives should they become damaged or inaccessible. With a recovery key that can be exported directly after the initial encryption of a network drive, it is also possible to restore the network drive at any time.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-user-shield&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css=&#8221;.vc_custom_1635932295704{margin-top: 30px !important;}&#8221; custom_color=&#8221;#97be0d&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;.vc_custom_1636376485058{margin-bottom: 30px !important;}&#8221;]<strong>Protection of your administrators in case of suspicion<\/strong><\/p>\n<p>Since HiCrypt\u2122 key management is only performed by people who are exclusively responsible for the confidentiality of data content (e.g. CEO), administrators are excluded from suspicion of knowing data content they are not supposed to know.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-check&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css=&#8221;.vc_custom_1635932587422{margin-top: 30px !important;}&#8221; custom_color=&#8221;#97be0d&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;.vc_custom_1636377281285{margin-bottom: 30px !important;}&#8221;]<strong>Support for individual corporate security policies<\/strong><\/p>\n<p>HiCrypt\u2122 can be easily adapted to individual security policies in terms of password security. Access to encrypted shares can be done by manually entering user name and password or additionally secured by a security token (e.g. a Smartcard). <a href=\"#1634217627756-1fa3851c-b854\">You can find out which tokens are currently supported by HiCrypt\u2122 here<\/a>. In addition, the use of a 4-eyes principle is supported for all administrative measures.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-arrows-alt&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css=&#8221;.vc_custom_1635932963084{margin-top: 30px !important;}&#8221; custom_color=&#8221;#97be0d&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;.vc_custom_1636377394265{margin-bottom: 30px !important;}&#8221;]<strong>Quickly installed, conveniently rolled out<\/strong><\/p>\n<p>HiCrypt\u2122 is client-based and is installed on the computers where confidential data is worked with. There are no server components and neither complex IT infrastructures nor directory services are required. For a fast and efficient integration of HiCrypt\u2122 into your daily work routine, the software supports so-called rollout strategies, where it can be installed automatically on the designated client computers.<\/p>\n<p>More detailed information on the automatic distribution of HiCrypt\u2122 can be found in our <a href=\"https:\/\/hicrypt.com\/en\/faq\/#HowToRollout\" target=\"_blank\" rel=\"noopener\">FAQs<\/a>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Instructions&#8221; tab_id=&#8221;1634217627442-037d7891-5259&#8243;][vc_column_text css=&#8221;.vc_custom_1636450458441{margin-bottom: 40px !important;}&#8221;]<strong>HiCrypt\u2122 &#8211; Protect your sensitive data so quickly anywhere, anytime:<\/strong>[\/vc_column_text][vc_row_inner el_class=&#8221;nicht_handy&#8221;][vc_column_inner width=&#8221;2\/12&#8243;][vc_column_text]<\/p>\n<h5>Download HiCrypt\u2122<\/h5>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/12&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-chevron-right&#8221; color=&#8221;custom&#8221; custom_color=&#8221;#97be0d&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;3\/12&#8243;][vc_column_text]<\/p>\n<h5>Roll out to devices via software distribution<\/h5>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/12&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-chevron-right&#8221; color=&#8221;custom&#8221; custom_color=&#8221;#97be0d&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/12&#8243;][vc_column_text]<\/p>\n<h5>Assign authorizations<\/h5>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/12&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-chevron-right&#8221; color=&#8221;custom&#8221; custom_color=&#8221;#97be0d&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/12&#8243;][vc_column_text]<\/p>\n<h5>Encrypt<\/h5>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;nur_handy&#8221;][vc_column_inner width=&#8221;2\/12&#8243;][vc_column_text]<\/p>\n<h5>Download HiCrypt\u2122<\/h5>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/12&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-chevron-down&#8221; color=&#8221;custom&#8221; custom_color=&#8221;#97be0d&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;3\/12&#8243;][vc_column_text]<\/p>\n<h5>Roll out to devices via software distribution<\/h5>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/12&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-chevron-down&#8221; color=&#8221;custom&#8221; custom_color=&#8221;#97be0d&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/12&#8243;][vc_column_text]<\/p>\n<h5>Assign authorizations<\/h5>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/12&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-chevron-down&#8221; color=&#8221;custom&#8221; custom_color=&#8221;#97be0d&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/12&#8243;][vc_column_text]<\/p>\n<h5>Encrypt<\/h5>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text css=&#8221;.vc_custom_1654672445660{margin-top: 30px !important;}&#8221;]<strong>Installation instructions and Read-Me-First:<\/strong><\/p>\n<p><a href=\"https:\/\/hicrypt.com\/download\/hicrypt_ReadMe1st_en.txt\" target=\"_blank\" rel=\"noopener\">Read-Me-First<\/a><br \/>\n<a href=\"https:\/\/hicrypt.com\/download\/hicrypt_howto_en.pdf\" target=\"_blank\" rel=\"noopener\">Step by Step instructions<\/a><br \/>\n<a href=\"https:\/\/hicrypt.com\/download\/hicrypt-floating.zip\" target=\"_blank\" rel=\"noopener\">HiCrypt (Floating)<\/a><br \/>\n<a href=\"https:\/\/hicrypt.com\/download\/hicrypt_floating_license_howto_en.pdf\" target=\"_blank\" rel=\"noopener\">HiCrypt Floating instructions<\/a><br \/>\n<a href=\"https:\/\/hicrypt.com\/download\/hicrypt_addon_yubikey_en.pdf\">How to use YubiKey 5 with HiCrypt<\/a>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;System requirements&#8221; tab_id=&#8221;1634217627602-c4733add-612b&#8221;][vc_column_text]<strong>Supported operating systems:<\/strong>[\/vc_column_text][vc_row_inner css=&#8221;.vc_custom_1635933166151{margin-bottom: 30px !important;}&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;&#8221;]Microsoft Windows 7<br \/>\nMicrosoft Windows 8<br \/>\nMicrosoft Windows 8.1<br \/>\nMicrosoft Windows 10*<br \/>\nMicrosoft Windows 11*<br \/>\nMicrosoft Windows Server 2008<br \/>\nMicrosoft Windows Server 2008 R2<br \/>\nMicrosoft Windows Server 2012<br \/>\nMicrosoft Windows Server 2012 R2<br \/>\nMicrosoft Windows Server 2016<br \/>\nMicrosoft Windows Server 2019[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]<span style=\"font-size: xx-small;\">* Depending on the use of the software, there may be restrictions (e.g. when attaching e-mail attachments via drag &amp; drop).<\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text]<strong>Terminal server environments:<\/strong><\/p>\n<p>HiCrypt\u2122 is compatible for use in terminal server environments. HiCrypt\u2122 can be configured in such a way that it can only be used for certain users. This reduces license costs, as a license only needs to be purchased for the actual number of sessions used.<\/p>\n<p>For more information on configuring HiCrypt\u2122 for terminal server environments, please refer to our <a href=\"https:\/\/hicrypt.com\/en\/faq\/#HowToDefineAllowedUserGroups\" target=\"_blank\" rel=\"noopener\">FAQs<\/a>.<\/p>\n<p><strong>System requirements:<\/strong><\/p>\n<p>HiCrypt\u2122 does not impose any special requirements on the system&#8217;s hardware. The system requirements of the operating system apply. To use HiCrypt\u2122, <a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=48137\" target=\"_blank\" rel=\"noopener\">Microsoft .NET Framework 4.6<\/a> must be installed prior to its installation. HiCrypt\u2122 itself encrypts data on network drives. At least one network drive must be connected for the software to take effect.<\/p>\n<p>For the use of floating licenses, the following ZIP file is also required: <a href=\"https:\/\/hicrypt.com\/download\/hicrypt-floating.zip\" target=\"_blank\" rel=\"noopener\">HiCrypt (Floating)<\/a>. Instructions for using floating licenses can be found here: <a href=\"https:\/\/hicrypt.com\/download\/hicrypt_floating_license_howto_en.pdf\" target=\"_blank\" rel=\"noopener\">HiCrypt Floating Instructions<\/a>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Notes&#8221; tab_id=&#8221;1634217627756-1fa3851c-b854&#8243;][vc_column_text]<strong>HiCrypt\u2122 supports the following tokens for encrypting and decrypting documents for added security:<\/strong><\/p>\n<p>MIFARE DESFire EV1<br \/>\nMIFARE DESFire EV2<br \/>\nLegic Advant<br \/>\nJava Card OS 2.1.1, 2.2+, 3.0.1, 3.0.4<br \/>\nMultos<br \/>\nStarcos<br \/>\nYubiKey 5<\/p>\n<p>The following tokens are now vulnerable and are therefore no longer recommended for use for security reasons, but could be used from a functional point of view: MIFARE Classic, Legic Prime<\/p>\n<p><strong>Encryption:<\/strong><\/p>\n<p>The following algorithms with the specified key lengths are used as encryption methods.<\/p>\n<p>AES (256bit)<br \/>\nBlowfish (448bit)<br \/>\nIDEA (128bit)<\/p>\n<p>For more information on the encryption algorithms used, please refer to our <a href=\"https:\/\/hicrypt.com\/en\/faq\/#HowToSelectTheRightEncryptionAlgorithm\" target=\"_blank\" rel=\"noopener\">FAQs<\/a>.<\/p>\n<p><strong>Network protocols:<\/strong><\/p>\n<p>HiCrypt\u2122 can encrypt network drives connected to standard Windows shares. Shares created with DFS (Distributed File System) are supported, but to encrypt network drives based on a share created with DFS, HiCrypt\u2122 requires Windows 7 or later.<\/p>\n<p>Network drives to shares shared with WEBDAV, analogous to DFS, are not fully supported until Windows 7 or later.<\/p>\n<p>WEBDAV, in turn, is the most common way to connect online hard drives as network drives. HiCrypt\u2122 currently supports only those online hard disks that are shared with WEBDAV and connected to the computer as a network drive.<br \/>\nSome online hard drive providers use their own software to connect a network drive to the online hard drive. In many cases, the standard redirector used by Microsoft is not used. Network drives connected in this way are not recognized by HiCrypt\u2122 and are therefore not supported. In case of doubt, HiCrypt\u2122 must be tested for compatibility with such software and the network drives connected to it. We will be happy to perform this test for you as part of our services.<\/p>\n<p><strong>Installation and rollout:<\/strong><\/p>\n<p>The HiCrypt\u2122 setup file is an executable file created with InstallShield. This allows HiCrypt\u2122 to be installed both manually and automatically. For this, the setup supports a so-called SILENT installation (or also called &#8220;Unattended Setup&#8221;). In this case, the installation is first carried out manually in the same way as it is to run automatically later. The manual installation is started on the command line by specifying parameters. A log file is created, which in turn must be specified as a parameter during the automatic installation. In this way, many software distribution systems are supported.<\/p>\n<p>You can find more information about automatic distribution of HiCrypt\u2122 in our <a href=\"https:\/\/hicrypt.com\/en\/faq\/#HowToRollout\" target=\"_blank\" rel=\"noopener\">FAQs<\/a>.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;License types&#8221; tab_id=&#8221;1634217627918-95c4c157-c094&#8243;][vc_column_text]You can choose the variant that suits you best from the following license types<sup>*<\/sup>. You are still undecided which solution is the right one for you? No problem! Our sales team will be happy to advise you.<\/p>\n<p><strong>Single user license:<\/strong><\/p>\n<p>With the single-user license, we offer a product key (license key) that can be used for activation on any number of systems (depending on the offer). One installation with one (simultaneous) user can be licensed at a time. A transfer of licenses is made possible by uninstallation (incl. deactivation).<\/p>\n<p><strong>Terminal server license:<\/strong><\/p>\n<p>With the terminal server license there is also a product key which must be generated, however, with the number of users to be logged on simultaneously (depending on the offer).\u202fSo here concurrent users on one system are licensed.<\/p>\n<p><strong>Floating license:<\/strong><\/p>\n<p>One copy of the software can be installed on multiple devices. However, only as many software instances can be used simultaneously as there are floating licenses. For verification, the software establishes a connection to the WIBU license server.<\/p>\n<p><strong>Volume License (\u201cGolden Key\u201d):<\/strong><\/p>\n<p>With the volume license, the actual license is bound to the domain and can thus be used as often as desired. A registry value is then set on the systems themselves, which confirms that a corresponding key has been obtained.[\/vc_column_text][vc_separator][vc_row_inner][vc_column_inner width=&#8221;1\/12&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-info&#8221; color=&#8221;custom&#8221; align=&#8221;center&#8221; custom_color=&#8221;#97be0d&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;11\/12&#8243;][vc_column_text]<sup>*<\/sup>The minimum order quantity is 5 license activations each. Individual agreements can be made within the scope of project request. Simply contact us.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Support&#8221; tab_id=&#8221;1634217628075-483a6bd6-6792&#8243;][vc_column_text]Do you know our <a href=\"https:\/\/hicrypt.com\/en\/faq\/\" target=\"_blank\" rel=\"noopener\">FAQs<\/a>?<br \/>\nYou have not found an answer to your question? No problem!<\/p>\n<p><strong>We are here for you!<\/strong><\/p>\n<p><strong>Monday to Friday from 08:00 am to 04:00 pm<\/strong>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-phone-alt&#8221; color=&#8221;mulled_wine&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]<a class=\"later\" href=\"tel:+49 371 81539-0\"><strong>+49 371 81539-0<\/strong><\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-at&#8221; color=&#8221;mulled_wine&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]<a class=\"later\" href=\"mailto:support@digitronic.net\"><strong>support@digitronic.net<\/strong><\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1602159446461{background-image: url(\/wp-content\/uploads\/sites\/3\/2020\/05\/breaker_grau-1.jpg?id=2374) !important;}&#8221;][vc_row][vc_column][vc_column_text el_id=&#8221;request&#8221; el_class=&#8221;anker&#8221;]Anker[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1643793949072{margin-top: 35px !important;}&#8221;]<\/p>\n<h3>Our sales and support team will be happy to advise you on our HiCrypt\u2122 encryption solution solution. Simply contact us or arrange a presentation appointment.<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;6\/12&#8243;][vc_row_inner][vc_column_inner][vc_column_text]<\/p>\n<h3><strong>Make a request now:<\/strong><\/h3>\n<p>[\/vc_column_text][vc_raw_html]JTNDc2NyaXB0JTNFJTBBJTIwJTIwJTIwJTIwZnVuY3Rpb24lMjBjaGtGb3JtdWxhciUyOCUyOSUyMCU3QiUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMGRvY3VtZW50LmdldEVsZW1lbnRCeUlkJTI4JTIyaWRXQ19jYXB0Y2hhUmVzdWx0JTIyJTI5LmNsYXNzTGlzdC5yZW1vdmUlMjglMjJyZWQlMjIlMjklM0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjB4JTIwJTNEJTIwZG9jdW1lbnQuZ2V0RWxlbWVudHNCeUNsYXNzTmFtZSUyOCUyMndjLWNhcHRjaGEtdmFsdWUxJTIyJTI5JTVCMCU1RC5pbm5lckhUTUwlM0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjB5JTIwJTNEJTIwZG9jdW1lbnQuZ2V0RWxlbWVudHNCeUNsYXNzTmFtZSUyOCUyMndjLWNhcHRjaGEtdmFsdWUyJTIyJTI5JTVCMCU1RC5pbm5lckhUTUwlM0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjB6JTIwJTNEJTIwZG9jdW1lbnQuZ2V0RWxlbWVudEJ5SWQlMjglMjJpZFdDX2NhcHRjaGFSZXN1bHQlMjIlMjkudmFsdWUlM0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjBpZiUyMCUyOCUyODElMkF4JTJCMSUyQXklMjklMjAlM0QlM0QlMjB6JTI5JTIwcmV0dXJuJTIwdHJ1ZSUzQiUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMGVsc2UlMjAlN0Jkb2N1bWVudC5nZXRFbGVtZW50QnlJZCUyOCUyMmlkV0NfY2FwdGNoYVJlc3VsdCUyMiUyOS5jbGFzc0xpc3QuYWRkJTI4JTIycmVkJTIyJTI5JTNCJTIwcmV0dXJuJTIwZmFsc2UlM0IlN0QlMEElMjAlMjAlMjAlMjAlN0QlMEElMjAlMjAlMjAlMjBqUXVlcnklMjhkb2N1bWVudCUyOS5yZWFkeSUyOGZ1bmN0aW9uJTI4JTI0JTI5JTIwJTdCJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwdmFyJTIwc2FsdCUyMCUzRCUyMCUyOG5ldyUyMERhdGUlMjkuZ2V0VGltZSUyOCUyOS50b1N0cmluZyUyOCUyOS5zdWJzdHIlMjgwJTJDJTIwMTIlMjklM0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjB2YXIlMjB2YWx1ZTElMjAlM0QlMjBNYXRoLmZsb29yJTI4JTI4TWF0aC5yYW5kb20lMjglMjklMjAlMkElMjAxMCUyOSUyOSUzQiUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMHZhciUyMHZhbHVlMiUyMCUzRCUyME1hdGguZmxvb3IlMjglMjhNYXRoLnJhbmRvbSUyOCUyOSUyMCUyQSUyMDEwJTI5JTI5JTNCJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwdmFsdWUxc2FsdCUzRCUyMHNhbHQlMjAlMkIlMjB2YWx1ZTEudG9TdHJpbmclMjglMjklM0IlMjAlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjB2YWx1ZTJzYWx0JTNEJTIwc2FsdCUyMCUyQiUyMHZhbHVlMi50b1N0cmluZyUyOCUyOSUzQiUyMCUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyNCUyOCUyMiUyM2lkV0NfY2FwdGNoYVZhbHVlMSUyMiUyOS52YWwlMjh2YWx1ZTFzYWx0JTI5JTNCJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTI0JTI4JTIyJTIzaWRXQ19jYXB0Y2hhVmFsdWUyJTIyJTI5LnZhbCUyOHZhbHVlMnNhbHQlMjklM0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjQlMjglMjIud2MtY2FwdGNoYS12YWx1ZTElMjIlMjkuYXBwZW5kJTI4dmFsdWUxJTI5JTNCJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTI0JTI4JTIyLndjLWNhcHRjaGEtdmFsdWUyJTIyJTI5LmFwcGVuZCUyOHZhbHVlMiUyOSUzQiUwQSUyMCUyMCUyMCUyMCU3RCUyOSUzQiUwQSUzQyUyRnNjcmlwdCUzRSUwQSUzQ2Zvcm0lMjBtZXRob2QlM0QlMjJwb3N0JTIyJTIwYWN0aW9uJTNEJTIyaHR0cHMlM0ElMkYlMkZkaWdpdHJvbmljLndlY2xhcHAuY29tJTJGd2ViYXBwJTJGc2VhbSUyRnJlc291cmNlJTJGcmVzdCUyRndlYjJsZWFkJTNGY2hhcnNldCUzRFVURi04JTIyJTIwYWNjZXB0LWNoYXJzZXQlM0QlMjJVVEYtOCUyMiUyMG9uU3VibWl0JTNEJTIycmV0dXJuJTIwY2hrRm9ybXVsYXIlMjglMjklMjIlM0UlMEElM0NsYWJlbCUyMGZvciUzRCUyMmlkV0NfY29tcGFueV9uYW1lJTIyJTNFQ29tcGFueSUyMCUyQSUzQyUyRmxhYmVsJTNFJTNDaW5wdXQlMjB0eXBlJTNEJTIydGV4dCUyMiUyMGlkJTNEJTIyaWRXQ19jb21wYW55X25hbWUlMjIlMjBuYW1lJTNEJTIyY29tcGFueV9uYW1lJTIyJTIwbWF4bGVuZ3RoJTNEJTIyMTAwMCUyMiUyMHJlcXVpcmVkJTIwJTJGJTNFJTBBJTNDbGFiZWwlMjBmb3IlM0QlMjJpZFdDX2VtYWlsJTIyJTNFRS1NYWlsJTIwJTJBJTNDJTJGbGFiZWwlM0UlM0NpbnB1dCUyMHR5cGUlM0QlMjJ0ZXh0JTIyJTIwaWQlM0QlMjJpZFdDX2VtYWlsJTIyJTIwbmFtZSUzRCUyMmVtYWlsJTIyJTIwbWF4bGVuZ3RoJTNEJTIyMTAwMCUyMiUyMHJlcXVpcmVkJTIwJTJGJTNFJTBBJTNDbGFiZWwlMjBmb3IlM0QlMjJpZFdDX3NhbHV0YXRpb24lMjIlM0VTYWx1dGF0aW9uJTNDJTJGbGFiZWwlM0UlM0NzZWxlY3QlMjBpZCUzRCUyMmlkV0Nfc2FsdXRhdGlvbiUyMiUyMG5hbWUlM0QlMjJzYWx1dGF0aW9uJTIyJTIwJTNFJTBBJTNDb3B0aW9uJTIwdmFsdWUlM0QlMjIlMjIlM0UlM0MlMkZvcHRpb24lM0UlMEElM0NvcHRpb24lMjB2YWx1ZSUzRCUyMk1SJTIyJTNFTXIlM0MlMkZvcHRpb24lM0UlMEElM0NvcHRpb24lMjB2YWx1ZSUzRCUyMk1SUyUyMiUzRU1ycyUzQyUyRm9wdGlvbiUzRSUwQSUzQyUyRnNlbGVjdCUzRSUwQSUzQ2xhYmVsJTIwZm9yJTNEJTIyaWRXQ19sYXN0TmFtZSUyMiUzRUxhc3QlMjBuYW1lJTIwJTJBJTNDJTJGbGFiZWwlM0UlM0NpbnB1dCUyMHR5cGUlM0QlMjJ0ZXh0JTIyJTIwaWQlM0QlMjJpZFdDX2xhc3ROYW1lJTIyJTIwbmFtZSUzRCUyMmxhc3ROYW1lJTIyJTIwbWF4bGVuZ3RoJTNEJTIyMTAwMCUyMiUyMCUyRiUzRSUwQSUzQ2xhYmVsJTIwZm9yJTNEJTIyaWRXQ19waG9uZSUyMiUzRVBob25lJTNDJTJGbGFiZWwlM0UlM0NpbnB1dCUyMHR5cGUlM0QlMjJ0ZXh0JTIyJTIwaWQlM0QlMjJpZFdDX3Bob25lJTIyJTIwbmFtZSUzRCUyMnBob25lJTIyJTIwbWF4bGVuZ3RoJTNEJTIyMTAwMCUyMiUyMCUyRiUzRSUwQSUzQ2xhYmVsJTIwZm9yJTNEJTIyaWRXQ19kZXNjcmlwdGlvbiUyMiUzRVJlcXVlc3QlM0MlMkZsYWJlbCUzRSUzQ3RleHRhcmVhJTIwaWQlM0QlMjJpZFdDX2Rlc2NyaXB0aW9uJTIyJTIwbmFtZSUzRCUyMmRlc2NyaXB0aW9uJTIyJTIwcm93cyUzRCUyNzUlMjclM0UlM0MlMkZ0ZXh0YXJlYSUzRSUwQSUzQ2lucHV0JTIwdHlwZSUzRCUyMmhpZGRlbiUyMiUyMGlkJTNEJTIyaWRXQ19lb3JpX251bWJlciUyMiUyMG5hbWUlM0QlMjJlb3JpX251bWJlciUyMiUyMG1heGxlbmd0aCUzRCUyMjEwMDAlMjIlMjB2YWx1ZSUzRCUyMlVyc3BydW5nJTNBJTIwS29udGFrdGZvcm11bGFyJTIwSGlDcnlwdCUyMEVOJTIyJTIwJTJGJTNFJTBBJTNDdWwlM0UlM0NsaSUzRSUwQSUwOSUzQ2lucHV0JTIwdmFsdWUlM0QlMjJ0cnVlJTIyJTIwdHlwZSUzRCUyMmNoZWNrYm94JTIyJTIwaWQlM0QlMjJkYXRlbnNjaHV0eiUyMiUyMG5hbWUlM0QlMjJkYXRlbnNjaHV0eiUyMiUyMHJlcXVpcmVkJTIwJTNFJTNDJTJGaW5wdXQlM0UlMEElMDklM0NsYWJlbCUyMGZvciUzRCUyMmRhdGVuc2NodXR6JTIyJTNFSSUyMGhhdmUlMjB0YWtlbiUyMG5vdGUlMjBvZiUyMHRoZSUyMCUzQ2ElMjBocmVmJTNEJTIyJTJGZW4lMkZwcml2YWN5LXBvbGljeSUyMiUyMHRhcmdldCUzRCUyMl9ibGFuayUyMiUzRVByaXZhY3klMjBQb2xpY3klM0MlMkZhJTNFJTIwYW5kJTIwYWdyZWUlMjB0aGF0JTIwbXklMjBkZXRhaWxzJTIwbWF5JTIwYmUlMjBzdG9yZWQlMjBmb3IlMjB0aGUlMjBwdXJwb3NlJTIwb2YlMjBjb250YWN0aW5nJTIwbWUlMjBhbmQlMjBmb3IlMjBxdWVyaWVzLiUwQSUwOSUzQyUyRmxhYmVsJTNFJTBBJTNDJTJGbGklM0UlM0MlMkZ1bCUzRSUwQSUzQ2IlM0VOZXdzbGV0dGVyJTIwc3Vic2NyaXB0aW9uJTNDJTJGYiUzRSUwQSUzQ2JyJTNFJTNDYnIlM0UlMEElM0N1bCUzRSUzQ2xpJTNFJTBBJTA5JTNDaW5wdXQlMjB2YWx1ZSUzRCUyMnRydWUlMjIlMjB0eXBlJTNEJTIyY2hlY2tib3glMjIlMjBpZCUzRCUyMmlkV0Nfb3B0X2luJTIyJTIwbmFtZSUzRCUyMm9wdF9pbiUyMiUyMCUzRSUzQyUyRmlucHV0JTNFJTBBJTA5JTNDbGFiZWwlMjBmb3IlM0QlMjJpZFdDX29wdF9pbiUyMiUzRVllcyUyQyUyMEklMjB3b3VsZCUyMGxpa2UlMjB0byUyMHJlY2VpdmUlMjBhbiUyMGluZGl2aWR1YWwlMjBuZXdzbGV0dGVyJTIwZGVzaWduZWQlMjB0byUyMG1lZXQlMjBteSUyMG5lZWRzLiUyMEZvciUyMHRoaXMlMjBwdXJwb3NlJTIwSSUyMGFsbG93JTIwZGlnaXRyb25pYyUyMGNvbXB1dGVyc3lzdGVtZSUyMGdtYmglMjB0byUyMGFuYWx5emUlMjBteSUyMGUtbWFpbCUyMG9wZW5pbmclMjBhbmQlMjBjbGlja2luZyUyMGJlaGF2aW9yJTIwYW5kJTIwdG8lMjBjcmVhdGUlMjBhJTIwcGVyc29uYWxpemVkJTIwdXNlciUyMHByb2ZpbGUuJTBBJTA5JTNDJTJGbGFiZWwlM0UlMEElM0MlMkZsaSUzRSUzQyUyRnVsJTNFJTBBJTNDZGl2JTIwaWQlM0QlMjJjYXB0Y2hhJTIyJTNFJTBBJTIwJTIwJTIwJTIwJTNDbGFiZWwlM0VUbyUyMG1ha2UlMjBzdXJlJTIweW91JUUyJTgwJTk5cmUlMjBub3QlMjBhJTIwcm9ib3QlMkMlMjBzbyUyMHdlJTIwYXNrJTIweW91JTIwdG8lMjBzb2x2ZSUyMGElMjBjaGFsbGVuZ2UlM0ElM0MlMkZsYWJlbCUzRSUwQSUyMCUyMCUyMCUyMCUzQ2RpdiUyMGNsYXNzJTNEJTIyd2MtY2FwdGNoYS1xdWVzdGlvbiUyMiUzRSUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMCUzQ3NwYW4lMjBjbGFzcyUzRCUyMndjLWNhcHRjaGEtdmFsdWUxJTIyJTNFJTNDJTJGc3BhbiUzRSUyMCUyQiUyMCUzQ3NwYW4lMjBjbGFzcyUzRCUyMndjLWNhcHRjaGEtdmFsdWUyJTIyJTNFJTNDJTJGc3BhbiUzRSUyMCUzRCUyMCUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMCUzQ2lucHV0JTIwdHlwZSUzRCUyMnRleHQlMjIlMjBpZCUzRCUyMmlkV0NfY2FwdGNoYVJlc3VsdCUyMiUyMG5hbWUlM0QlMjJjYXB0Y2hhUmVzdWx0JTIyJTIwcmVxdWlyZWQlMjAlMkYlM0UlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlM0NpbnB1dCUyMHR5cGUlM0QlMjJoaWRkZW4lMjIlMjBpZCUzRCUyMmlkV0NfY2FwdGNoYVZhbHVlMSUyMiUyMG5hbWUlM0QlMjJjYXB0Y2hhVmFsdWUxJTIyJTIwJTJGJTNFJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTNDaW5wdXQlMjB0eXBlJTNEJTIyaGlkZGVuJTIyJTIwaWQlM0QlMjJpZFdDX2NhcHRjaGFWYWx1ZTIlMjIlMjBuYW1lJTNEJTIyY2FwdGNoYVZhbHVlMiUyMiUyMCUyRiUzRSUwQSUyMCUyMCUyMCUyMCUzQyUyRmRpdiUzRSUwQSUzQyUyRmRpdiUzRSUwQSUzQ2lucHV0JTIwdHlwZSUzRCUyMmhpZGRlbiUyMiUyMG5hbWUlM0QlMjJob25leXBvdCUyMiUyMHZhbHVlJTNEJTIyJTIyJTIwJTJGJTNFJTBBJTNDaW5wdXQlMjB0eXBlJTNEJTIyaGlkZGVuJTIyJTIwbmFtZSUzRCUyMnRva2VuJTIyJTIwdmFsdWUlM0QlMjI2NTUyYzEzMy05NmQzLTQzODEtOWY3ZS0zMWVmYjdjZTk4MjQlMjIlMjAlMkYlM0UlMEElM0NpbnB1dCUyMHR5cGUlM0QlMjJzdWJtaXQlMjIlMjB2YWx1ZSUzRCUyMnNlbmQlMjIlMjAlMkYlM0UlMEElM0MlMkZmb3JtJTNF[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;6\/12&#8243;][vc_column_text css=&#8221;.vc_custom_1637237298235{margin-bottom: 30px !important;}&#8221;]<\/p>\n<h3><strong>Get advice now:<\/strong><\/h3>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-phone-alt&#8221; color=&#8221;mulled_wine&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;&#8221;]<a class=\"later\" href=\"tel:+4937181539444\"><strong>+49 371 81539-444<\/strong><\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-at&#8221; color=&#8221;mulled_wine&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]<a class=\"later\" href=\"mailto:sales@digitronic.net\"><strong>sales@digitronic.net<\/strong><\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1635936085730{margin-top: 50px !important;}&#8221;][vc_column_inner width=&#8221;6\/12&#8243;][vc_single_image image=&#8221;9757&#8243; alignment=&#8221;center&#8221; css=&#8221;&#8221; el_class=&#8221;bild_rund&#8221;][vc_column_text css=&#8221;.vc_custom_1767798753746{margin-top: 20px !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\"><strong>Alexander Woeschka<\/strong><br \/>\nManaging Director<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column el_class=&#8221;bild&#8221;][vc_single_image image=&#8221;7991&#8243; img_size=&#8221;full&#8221;][\/vc_column][\/vc_row][vc_section][vc_row][vc_column width=&#8221;4\/5&#8243;][vc_column_text el_id=&#8221;contact&#8221; el_class=&#8221;anker&#8221;]Anker[\/vc_column_text][vc_column_text] Reliable data encryption with HiCrypt\u2122 [\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1705051722504{margin-bottom: 20px !important;}&#8221;]Unencrypted data is a risk for your company on several levels. For example, data can be stolen by criminals or misused internally by unauthorised individuals. Administrators in particular often feel exposed to the general suspicion that they can see everything &hellip; <a href=\"https:\/\/www.digitronic.net\/en\/encryption\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Encryption&#8221;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5012","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>HiCrypt\u2122 encryption software - digitronic<\/title>\n<meta name=\"description\" content=\"HiCrypt\u2122 guarantees the highest data security for your company by encrypting entire file servers - Try it now for free!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitronic.net\/en\/encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HiCrypt\u2122 encryption software - digitronic\" \/>\n<meta property=\"og:description\" content=\"HiCrypt\u2122 guarantees the highest data security for your company by encrypting entire file servers - Try it now for free!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitronic.net\/en\/encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"digitronic\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-05T12:51:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/11\/verschluesselung-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"HiCrypt\u2122 encryption software - digitronic\" \/>\n<meta name=\"twitter:description\" content=\"HiCrypt\u2122 guarantees the highest data security for your company by encrypting entire file servers - Try it now for free!\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/11\/verschluesselung-2.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption\\\/\",\"url\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption\\\/\",\"name\":\"HiCrypt\u2122 encryption software - digitronic\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitronic.net\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2026\\\/03\\\/Alex_Bild_FINAL-Kopie-scaled.jpg\",\"datePublished\":\"2021-11-09T17:25:52+00:00\",\"dateModified\":\"2026-03-05T12:51:55+00:00\",\"description\":\"HiCrypt\u2122 guarantees the highest data security for your company by encrypting entire file servers - Try it now for free!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitronic.net\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2026\\\/03\\\/Alex_Bild_FINAL-Kopie-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitronic.net\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2026\\\/03\\\/Alex_Bild_FINAL-Kopie-scaled.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/encryption\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/#website\",\"url\":\"https:\\\/\\\/www.digitronic.net\\\/\",\"name\":\"digitronic\",\"description\":\"Spezialist f\u00fcr Datensicherheit und 2-Faktor-Authentifzierung\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitronic.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HiCrypt\u2122 encryption software - digitronic","description":"HiCrypt\u2122 guarantees the highest data security for your company by encrypting entire file servers - Try it now for free!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitronic.net\/en\/encryption\/","og_locale":"en_US","og_type":"article","og_title":"HiCrypt\u2122 encryption software - digitronic","og_description":"HiCrypt\u2122 guarantees the highest data security for your company by encrypting entire file servers - Try it now for free!","og_url":"https:\/\/www.digitronic.net\/en\/encryption\/","og_site_name":"digitronic","article_modified_time":"2026-03-05T12:51:55+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/11\/verschluesselung-2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"HiCrypt\u2122 encryption software - digitronic","twitter_description":"HiCrypt\u2122 guarantees the highest data security for your company by encrypting entire file servers - Try it now for free!","twitter_image":"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/11\/verschluesselung-2.jpg","twitter_misc":{"Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.digitronic.net\/en\/encryption\/","url":"https:\/\/www.digitronic.net\/en\/encryption\/","name":"HiCrypt\u2122 encryption software - digitronic","isPartOf":{"@id":"https:\/\/www.digitronic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitronic.net\/en\/encryption\/#primaryimage"},"image":{"@id":"https:\/\/www.digitronic.net\/en\/encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-scaled.jpg","datePublished":"2021-11-09T17:25:52+00:00","dateModified":"2026-03-05T12:51:55+00:00","description":"HiCrypt\u2122 guarantees the highest data security for your company by encrypting entire file servers - Try it now for free!","breadcrumb":{"@id":"https:\/\/www.digitronic.net\/en\/encryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitronic.net\/en\/encryption\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitronic.net\/en\/encryption\/#primaryimage","url":"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-scaled.jpg","contentUrl":"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-scaled.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitronic.net\/en\/encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.digitronic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Encryption"}]},{"@type":"WebSite","@id":"https:\/\/www.digitronic.net\/#website","url":"https:\/\/www.digitronic.net\/","name":"digitronic","description":"Spezialist f\u00fcr Datensicherheit und 2-Faktor-Authentifzierung","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitronic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/pages\/5012","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/comments?post=5012"}],"version-history":[{"count":15,"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/pages\/5012\/revisions"}],"predecessor-version":[{"id":9795,"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/pages\/5012\/revisions\/9795"}],"wp:attachment":[{"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/media?parent=5012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}