Administrations and authorities<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n
[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/4″][vc_icon icon_fontawesome=”fas fa-exclamation” color=”white” align=”center”][\/vc_column_inner][vc_column_inner width=”3\/4″][vc_column_text]Companies with critical infrastructures (CRITIS)[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=”dreieck_unten” css=”.vc_custom_1636378204543{padding-bottom: 20px !important;}”][vc_column][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=”stretch_row” css=”.vc_custom_1635851895295{margin-top: 30px !important;}”][vc_row][vc_column][vc_column_text css=”.vc_custom_1647436266664{margin-bottom: 30px !important;}”]<\/p>\n
HiCrypt\u2122 protects your company from these threats:<\/h2>\n
[\/vc_column_text][vc_row_inner][vc_column_inner width=”1\/4″][vc_icon icon_fontawesome=”fas fa-shield-alt” color=”custom” size=”lg” align=”center” custom_color=”#97be0d”][vc_column_text]<\/p>\n
Misuse of data content<\/p>\n
[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/4″][vc_icon icon_fontawesome=”fas fa-user-secret” color=”custom” size=”lg” align=”center” custom_color=”#97be0d”][vc_column_text]<\/p>\n
Data theft & industrial espionage<\/p>\n
[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/4″][vc_icon icon_fontawesome=”fas fa-user-shield” color=”custom” size=”lg” align=”center” custom_color=”#97be0d”][vc_column_text]<\/p>\n
Suspicions of personnel working administratively<\/p>\n
[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/4″][vc_icon icon_fontawesome=”fas fa-balance-scale” color=”custom” size=”lg” align=”center” custom_color=”#97be0d”][vc_column_text]<\/p>\n
DSGVO & compliance uncertainties<\/p>\n
[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=”stretch_row” css=”.vc_custom_1647436582761{margin-top: 30px !important;background-color: #f1f1f3 !important;}”][vc_row][vc_column][vc_column_text css=”.vc_custom_1647436614852{margin-bottom: 30px !important;}”]<\/p>\n
What is confidential data?<\/h2>\n
[\/vc_column_text][vc_column_text]You can find out more about what confidential data is and why the usual Windows tools are usually not enough to protect it from espionage and misuse in our blog post on “Encryption as a central component of IT security”.[\/vc_column_text][vc_column_text el_class=”gruen”]<\/p>\n
<\/i> Read blog post now!<\/a><\/h3>\n[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section css=”.vc_custom_1635856278383{margin-top: 50px !important;}”][vc_row][vc_column][vc_column_text el_id=”info” el_class=”anker”]Anker[\/vc_column_text][vc_column_text]<\/p>\n
HiCrypt\u2122 – All important information<\/h2>\n
[\/vc_column_text][vc_tta_tabs][vc_tta_section title=”DOWNLOAD” tab_id=”1634217626939-8693a53b-5578″][vc_row_inner][vc_column_inner width=”2\/3″][vc_column_text]Download the latest version of HiCrypt\u2122 Professional<\/strong> here.<\/p>\nDid you already know?<\/strong> As a new customer you can test the encryption solution free of charge and without obligation for 30 days. After 30 days the license will expire automatically, you don’t have to care about anything else, unless you want to renew or buy the software. In that case, please just contact our sales team<\/a>.[\/vc_column_text][vc_column_text]If you register with us now as a new prospective customer, you will ensure the following benefits during the trial period:<\/p>\n\u2713 Excellent support<\/strong> from our friendly staff.
\n\u2713 Free advice<\/strong> from our IT security experts[\/vc_column_text][vc_column_text css=”” el_class=”download_button”]Download HiCrypt\u2122<\/a>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=”download_fenster” width=”1\/3″][vc_column_text]<\/p>\nProduct Key version<\/b><\/em><\/h5>\n[\/vc_column_text][vc_column_text css=””]Filename:<\/strong> HiCrypt.exe
\nSize:<\/strong> 8,42 MB
\nVersion:<\/strong> 2.4.9
\nPublished on:<\/strong> August 13th 2024[\/vc_column_text][vc_column_text]<\/p>\nFloating version<\/b><\/em><\/h5>\n[\/vc_column_text][vc_column_text css=””]Filename:<\/strong> HiCrypt.msi
\nSize:<\/strong> 8,74 MB
\nVersion:<\/strong> 2.4.9
\nPublished on:<\/strong> August 13th 2024[\/vc_column_text][vc_separator][vc_column_text]Additional downloads:<\/strong><\/p>\nRead-Me-First<\/a>
\nStep by Step instructions<\/a>
\nHiCrypt (Floating)<\/a>
\nHiCrypt Floating instructions<\/a>
\nHow to use YubiKey 5 with HiCrypt<\/a>[\/vc_column_text][vc_separator][vc_column_text]FACT SHEET<\/a>
\nFAQ\u00a0<\/a>
\nRELEASE NOTES<\/a>[\/vc_column_text][vc_hoverbox image=”5760″ primary_title=”” hover_title=”All-in-one-package for your information and data security” hover_btn_title=”Learn more” hover_btn_style=”outline-custom” hover_btn_outline_custom_color=”#97be0d” hover_btn_outline_custom_hover_background=”#d6d6d6″ hover_btn_outline_custom_hover_text=”#ffffff” hover_btn_shape=”square” hover_add_button=”true” hover_btn_link=”url:%2Fen%2Fall-in-one-compliance-packages%2F|target:_blank”]For even more protection, our HiCrypt\u2122 encryption solution is also available as an all-in-one compliance package in conjunction with our SmartLogon\u2122 2-factor authentication, including hardware, installation support, maintenance and support. This gives you all-round protection for your data from a single source, direct from the manufacturer.[\/vc_hoverbox][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=”Features” tab_id=”1634217734679-5f4a52fd-c52a”][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-lock” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635859866067{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636375498890{margin-bottom: 30px !important;}”]Reliable encryption of sensitive information<\/strong><\/p>\nHiCrypt\u2122 encrypts data on network drives and enables convenient and secure teamwork. The encryption and decryption of files takes place directly on the PC in the familiar user environment. This means that both the data transfer to the storage location and the file storage itself are encrypted and only authorized persons can view the information.\u00a0The data is encrypted using standardized, recognized encryption methods. More detailed information on the algorithms used can be found here<\/a>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-key” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635931251115{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636375533373{margin-bottom: 30px !important;}”]Key possession guarantee without a back door<\/strong><\/p>\nOur promise as a certified manufacturer of IT security solutions: With HiCrypt\u2122, you alone manage the access permissions to the encrypted data. You decide who from your company can decrypt the data. Neither we nor anyone else but you has control over the key information to the protected data. This is your key-ownership guarantee![\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-user-friends” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635931526728{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636375556287{margin-bottom: 30px !important;}”]Working together in a familiar environment<\/strong><\/p>\nUnlike conventional container encryption solutions, HiCrypt\u2122 still allows several people to access encrypted network drives simultaneously – provided, of course, that they have the appropriate access rights. Since HiCrypt\u2122 is simply displayed as another network drive in Explorer, there is no change to the familiar working environment for your employees.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-user-plus” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635931684307{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636375894683{margin-bottom: 30px !important;}”]Integrated user management for flexible assignment of rights<\/strong><\/p>\nIntegrated user management allows additional users to be granted access to the encrypted content – independent of local or domain user accounts. This enables user administration even without administrative privileges. The security of your data thus remains in your hands.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-cloud-upload-alt” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635931863329{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636376374736{margin-bottom: 30px !important;}”]HiCrypt\u2122 in the cloud<\/strong><\/p>\nWith HiCrypt\u2122, you can also store your data securely from unauthorized access in the cloud and share it with your colleagues or customers as needed. Terminal server services can also be further qualified and made more secure by HiCrypt\u2122. The highest DSGVO compliance is achieved, as no information is stored unencrypted with external service providers. By supporting terminal server environments, HiCrypt\u2122 can be used for any variation of Desktop as a Service (DaaS) applications.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-life-ring” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635932054703{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636376465299{margin-bottom: 30px !important;}”]Emergency recovery options (disaster recovery)<\/strong><\/p>\nHiCrypt\u2122 offers several options for repairing network drives should they become damaged or inaccessible. With a recovery key that can be exported directly after the initial encryption of a network drive, it is also possible to restore the network drive at any time.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-user-shield” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635932295704{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636376485058{margin-bottom: 30px !important;}”]Protection of your administrators in case of suspicion<\/strong><\/p>\nSince HiCrypt\u2122 key management is only performed by people who are exclusively responsible for the confidentiality of data content (e.g. CEO), administrators are excluded from suspicion of knowing data content they are not supposed to know.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-check” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635932587422{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636377281285{margin-bottom: 30px !important;}”]Support for individual corporate security policies<\/strong><\/p>\nHiCrypt\u2122 can be easily adapted to individual security policies in terms of password security. Access to encrypted shares can be done by manually entering user name and password or additionally secured by a security token (e.g. a Smartcard). You can find out which tokens are currently supported by HiCrypt\u2122 here<\/a>. In addition, the use of a 4-eyes principle is supported for all administrative measures.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-arrows-alt” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635932963084{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636377394265{margin-bottom: 30px !important;}”]Quickly installed, conveniently rolled out<\/strong><\/p>\nHiCrypt\u2122 is client-based and is installed on the computers where confidential data is worked with. There are no server components and neither complex IT infrastructures nor directory services are required. For a fast and efficient integration of HiCrypt\u2122 into your daily work routine, the software supports so-called rollout strategies, where it can be installed automatically on the designated client computers.<\/p>\n
More detailed information on the automatic distribution of HiCrypt\u2122 can be found in our FAQs<\/a>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=”Instructions” tab_id=”1634217627442-037d7891-5259″][vc_column_text css=”.vc_custom_1636450458441{margin-bottom: 40px !important;}”]HiCrypt\u2122 – Protect your sensitive data so quickly anywhere, anytime:<\/strong>[\/vc_column_text][vc_row_inner el_class=”nicht_handy”][vc_column_inner width=”2\/12″][vc_column_text]<\/p>\nDownload HiCrypt\u2122<\/h5>\n
[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/12″][vc_icon icon_fontawesome=”fas fa-chevron-right” color=”custom” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”3\/12″][vc_column_text]<\/p>\n
Roll out to devices via software distribution<\/h5>\n
[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/12″][vc_icon icon_fontawesome=”fas fa-chevron-right” color=”custom” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”2\/12″][vc_column_text]<\/p>\n
Assign authorizations<\/h5>\n
[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/12″][vc_icon icon_fontawesome=”fas fa-chevron-right” color=”custom” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”2\/12″][vc_column_text]<\/p>\n
Encrypt<\/h5>\n
[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=”nur_handy”][vc_column_inner width=”2\/12″][vc_column_text]<\/p>\n
Download HiCrypt\u2122<\/h5>\n
[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/12″][vc_icon icon_fontawesome=”fas fa-chevron-down” color=”custom” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”3\/12″][vc_column_text]<\/p>\n
Roll out to devices via software distribution<\/h5>\n
[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/12″][vc_icon icon_fontawesome=”fas fa-chevron-down” color=”custom” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”2\/12″][vc_column_text]<\/p>\n
Assign authorizations<\/h5>\n
[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/12″][vc_icon icon_fontawesome=”fas fa-chevron-down” color=”custom” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”2\/12″][vc_column_text]<\/p>\n
Encrypt<\/h5>\n
[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text css=”.vc_custom_1654672445660{margin-top: 30px !important;}”]Installation instructions and Read-Me-First:<\/strong><\/p>\nRead-Me-First<\/a>
\nStep by Step instructions<\/a>
\nHiCrypt (Floating)<\/a>
\nHiCrypt Floating instructions<\/a>
\nHow to use YubiKey 5 with HiCrypt<\/a>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=”System requirements” tab_id=”1634217627602-c4733add-612b”][vc_column_text]Supported operating systems:<\/strong>[\/vc_column_text][vc_row_inner css=”.vc_custom_1635933166151{margin-bottom: 30px !important;}”][vc_column_inner width=”1\/3″][vc_column_text css=””]Microsoft Windows 7
\nMicrosoft Windows 8
\nMicrosoft Windows 8.1
\nMicrosoft Windows 10*
\nMicrosoft Windows 11*
\nMicrosoft Windows Server 2008
\nMicrosoft Windows Server 2008 R2
\nMicrosoft Windows Server 2012
\nMicrosoft Windows Server 2012 R2
\nMicrosoft Windows Server 2016
\nMicrosoft Windows Server 2019[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”2\/3″][vc_column_text css=””]* Depending on the use of the software, there may be restrictions (e.g. when attaching e-mail attachments via drag & drop).<\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text]Terminal server environments:<\/strong><\/p>\nHiCrypt\u2122 is compatible for use in terminal server environments. HiCrypt\u2122 can be configured in such a way that it can only be used for certain users. This reduces license costs, as a license only needs to be purchased for the actual number of sessions used.<\/p>\n
For more information on configuring HiCrypt\u2122 for terminal server environments, please refer to our FAQs<\/a>.<\/p>\nSystem requirements:<\/strong><\/p>\nHiCrypt\u2122 does not impose any special requirements on the system’s hardware. The system requirements of the operating system apply. To use HiCrypt\u2122, Microsoft .NET Framework 4.6<\/a> must be installed prior to its installation. HiCrypt\u2122 itself encrypts data on network drives. At least one network drive must be connected for the software to take effect.<\/p>\nFor the use of floating licenses, the following ZIP file is also required: HiCrypt (Floating)<\/a>. Instructions for using floating licenses can be found here: HiCrypt Floating Instructions<\/a>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=”Notes” tab_id=”1634217627756-1fa3851c-b854″][vc_column_text]HiCrypt\u2122 supports the following tokens for encrypting and decrypting documents for added security:<\/strong><\/p>\nMIFARE DESFire EV1
\nMIFARE DESFire EV2
\nLegic Advant
\nJava Card OS 2.1.1, 2.2+, 3.0.1, 3.0.4
\nMultos
\nStarcos
\nYubiKey 5<\/p>\n
The following tokens are now vulnerable and are therefore no longer recommended for use for security reasons, but could be used from a functional point of view: MIFARE Classic, Legic Prime<\/p>\n
Encryption:<\/strong><\/p>\nThe following algorithms with the specified key lengths are used as encryption methods.<\/p>\n
AES (256bit)
\nBlowfish (448bit)
\nIDEA (128bit)<\/p>\n
For more information on the encryption algorithms used, please refer to our FAQs<\/a>.<\/p>\n
Did you already know?<\/strong> As a new customer you can test the encryption solution free of charge and without obligation for 30 days. After 30 days the license will expire automatically, you don’t have to care about anything else, unless you want to renew or buy the software. In that case, please just contact our sales team<\/a>.[\/vc_column_text][vc_column_text]If you register with us now as a new prospective customer, you will ensure the following benefits during the trial period:<\/p>\n \u2713 Excellent support<\/strong> from our friendly staff. [\/vc_column_text][vc_column_text css=””]Filename:<\/strong> HiCrypt.exe [\/vc_column_text][vc_column_text css=””]Filename:<\/strong> HiCrypt.msi Read-Me-First<\/a> HiCrypt\u2122 encrypts data on network drives and enables convenient and secure teamwork. The encryption and decryption of files takes place directly on the PC in the familiar user environment. This means that both the data transfer to the storage location and the file storage itself are encrypted and only authorized persons can view the information.\u00a0The data is encrypted using standardized, recognized encryption methods. More detailed information on the algorithms used can be found here<\/a>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-key” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635931251115{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636375533373{margin-bottom: 30px !important;}”]Key possession guarantee without a back door<\/strong><\/p>\n Our promise as a certified manufacturer of IT security solutions: With HiCrypt\u2122, you alone manage the access permissions to the encrypted data. You decide who from your company can decrypt the data. Neither we nor anyone else but you has control over the key information to the protected data. This is your key-ownership guarantee![\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-user-friends” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635931526728{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636375556287{margin-bottom: 30px !important;}”]Working together in a familiar environment<\/strong><\/p>\n Unlike conventional container encryption solutions, HiCrypt\u2122 still allows several people to access encrypted network drives simultaneously – provided, of course, that they have the appropriate access rights. Since HiCrypt\u2122 is simply displayed as another network drive in Explorer, there is no change to the familiar working environment for your employees.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-user-plus” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635931684307{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636375894683{margin-bottom: 30px !important;}”]Integrated user management for flexible assignment of rights<\/strong><\/p>\n Integrated user management allows additional users to be granted access to the encrypted content – independent of local or domain user accounts. This enables user administration even without administrative privileges. The security of your data thus remains in your hands.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-cloud-upload-alt” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635931863329{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636376374736{margin-bottom: 30px !important;}”]HiCrypt\u2122 in the cloud<\/strong><\/p>\n With HiCrypt\u2122, you can also store your data securely from unauthorized access in the cloud and share it with your colleagues or customers as needed. Terminal server services can also be further qualified and made more secure by HiCrypt\u2122. The highest DSGVO compliance is achieved, as no information is stored unencrypted with external service providers. By supporting terminal server environments, HiCrypt\u2122 can be used for any variation of Desktop as a Service (DaaS) applications.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-life-ring” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635932054703{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636376465299{margin-bottom: 30px !important;}”]Emergency recovery options (disaster recovery)<\/strong><\/p>\n HiCrypt\u2122 offers several options for repairing network drives should they become damaged or inaccessible. With a recovery key that can be exported directly after the initial encryption of a network drive, it is also possible to restore the network drive at any time.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-user-shield” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635932295704{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636376485058{margin-bottom: 30px !important;}”]Protection of your administrators in case of suspicion<\/strong><\/p>\n Since HiCrypt\u2122 key management is only performed by people who are exclusively responsible for the confidentiality of data content (e.g. CEO), administrators are excluded from suspicion of knowing data content they are not supposed to know.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-check” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635932587422{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636377281285{margin-bottom: 30px !important;}”]Support for individual corporate security policies<\/strong><\/p>\n HiCrypt\u2122 can be easily adapted to individual security policies in terms of password security. Access to encrypted shares can be done by manually entering user name and password or additionally secured by a security token (e.g. a Smartcard). You can find out which tokens are currently supported by HiCrypt\u2122 here<\/a>. In addition, the use of a 4-eyes principle is supported for all administrative measures.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-arrows-alt” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635932963084{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636377394265{margin-bottom: 30px !important;}”]Quickly installed, conveniently rolled out<\/strong><\/p>\n HiCrypt\u2122 is client-based and is installed on the computers where confidential data is worked with. There are no server components and neither complex IT infrastructures nor directory services are required. For a fast and efficient integration of HiCrypt\u2122 into your daily work routine, the software supports so-called rollout strategies, where it can be installed automatically on the designated client computers.<\/p>\n More detailed information on the automatic distribution of HiCrypt\u2122 can be found in our FAQs<\/a>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=”Instructions” tab_id=”1634217627442-037d7891-5259″][vc_column_text css=”.vc_custom_1636450458441{margin-bottom: 40px !important;}”]HiCrypt\u2122 – Protect your sensitive data so quickly anywhere, anytime:<\/strong>[\/vc_column_text][vc_row_inner el_class=”nicht_handy”][vc_column_inner width=”2\/12″][vc_column_text]<\/p>\n [\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/12″][vc_icon icon_fontawesome=”fas fa-chevron-right” color=”custom” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”3\/12″][vc_column_text]<\/p>\n [\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/12″][vc_icon icon_fontawesome=”fas fa-chevron-right” color=”custom” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”2\/12″][vc_column_text]<\/p>\n [\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/12″][vc_icon icon_fontawesome=”fas fa-chevron-right” color=”custom” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”2\/12″][vc_column_text]<\/p>\n [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=”nur_handy”][vc_column_inner width=”2\/12″][vc_column_text]<\/p>\n [\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/12″][vc_icon icon_fontawesome=”fas fa-chevron-down” color=”custom” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”3\/12″][vc_column_text]<\/p>\n [\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/12″][vc_icon icon_fontawesome=”fas fa-chevron-down” color=”custom” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”2\/12″][vc_column_text]<\/p>\n [\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/12″][vc_icon icon_fontawesome=”fas fa-chevron-down” color=”custom” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”2\/12″][vc_column_text]<\/p>\n [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text css=”.vc_custom_1654672445660{margin-top: 30px !important;}”]Installation instructions and Read-Me-First:<\/strong><\/p>\n Read-Me-First<\/a> HiCrypt\u2122 is compatible for use in terminal server environments. HiCrypt\u2122 can be configured in such a way that it can only be used for certain users. This reduces license costs, as a license only needs to be purchased for the actual number of sessions used.<\/p>\n For more information on configuring HiCrypt\u2122 for terminal server environments, please refer to our FAQs<\/a>.<\/p>\n System requirements:<\/strong><\/p>\n HiCrypt\u2122 does not impose any special requirements on the system’s hardware. The system requirements of the operating system apply. To use HiCrypt\u2122, Microsoft .NET Framework 4.6<\/a> must be installed prior to its installation. HiCrypt\u2122 itself encrypts data on network drives. At least one network drive must be connected for the software to take effect.<\/p>\n For the use of floating licenses, the following ZIP file is also required: HiCrypt (Floating)<\/a>. Instructions for using floating licenses can be found here: HiCrypt Floating Instructions<\/a>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=”Notes” tab_id=”1634217627756-1fa3851c-b854″][vc_column_text]HiCrypt\u2122 supports the following tokens for encrypting and decrypting documents for added security:<\/strong><\/p>\n MIFARE DESFire EV1 The following tokens are now vulnerable and are therefore no longer recommended for use for security reasons, but could be used from a functional point of view: MIFARE Classic, Legic Prime<\/p>\n Encryption:<\/strong><\/p>\n The following algorithms with the specified key lengths are used as encryption methods.<\/p>\n AES (256bit) For more information on the encryption algorithms used, please refer to our FAQs<\/a>.<\/p>\n
\n\u2713 Free advice<\/strong> from our IT security experts[\/vc_column_text][vc_column_text css=”” el_class=”download_button”]Download HiCrypt\u2122<\/a>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=”download_fenster” width=”1\/3″][vc_column_text]<\/p>\nProduct Key version<\/b><\/em><\/h5>\n
\nSize:<\/strong> 8,42 MB
\nVersion:<\/strong> 2.4.9
\nPublished on:<\/strong> August 13th 2024[\/vc_column_text][vc_column_text]<\/p>\nFloating version<\/b><\/em><\/h5>\n
\nSize:<\/strong> 8,74 MB
\nVersion:<\/strong> 2.4.9
\nPublished on:<\/strong> August 13th 2024[\/vc_column_text][vc_separator][vc_column_text]Additional downloads:<\/strong><\/p>\n
\nStep by Step instructions<\/a>
\nHiCrypt (Floating)<\/a>
\nHiCrypt Floating instructions<\/a>
\nHow to use YubiKey 5 with HiCrypt<\/a>[\/vc_column_text][vc_separator][vc_column_text]FACT SHEET<\/a>
\nFAQ\u00a0<\/a>
\nRELEASE NOTES<\/a>[\/vc_column_text][vc_hoverbox image=”5760″ primary_title=”” hover_title=”All-in-one-package for your information and data security” hover_btn_title=”Learn more” hover_btn_style=”outline-custom” hover_btn_outline_custom_color=”#97be0d” hover_btn_outline_custom_hover_background=”#d6d6d6″ hover_btn_outline_custom_hover_text=”#ffffff” hover_btn_shape=”square” hover_add_button=”true” hover_btn_link=”url:%2Fen%2Fall-in-one-compliance-packages%2F|target:_blank”]For even more protection, our HiCrypt\u2122 encryption solution is also available as an all-in-one compliance package in conjunction with our SmartLogon\u2122 2-factor authentication, including hardware, installation support, maintenance and support. This gives you all-round protection for your data from a single source, direct from the manufacturer.[\/vc_hoverbox][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=”Features” tab_id=”1634217734679-5f4a52fd-c52a”][vc_row_inner][vc_column_inner width=”1\/6″][vc_icon icon_fontawesome=”fas fa-lock” color=”custom” size=”xl” align=”center” css=”.vc_custom_1635859866067{margin-top: 30px !important;}” custom_color=”#97be0d”][\/vc_column_inner][vc_column_inner width=”5\/6″][vc_column_text css=”.vc_custom_1636375498890{margin-bottom: 30px !important;}”]Reliable encryption of sensitive information<\/strong><\/p>\nDownload HiCrypt\u2122<\/h5>\n
Roll out to devices via software distribution<\/h5>\n
Assign authorizations<\/h5>\n
Encrypt<\/h5>\n
Download HiCrypt\u2122<\/h5>\n
Roll out to devices via software distribution<\/h5>\n
Assign authorizations<\/h5>\n
Encrypt<\/h5>\n
\nStep by Step instructions<\/a>
\nHiCrypt (Floating)<\/a>
\nHiCrypt Floating instructions<\/a>
\nHow to use YubiKey 5 with HiCrypt<\/a>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=”System requirements” tab_id=”1634217627602-c4733add-612b”][vc_column_text]Supported operating systems:<\/strong>[\/vc_column_text][vc_row_inner css=”.vc_custom_1635933166151{margin-bottom: 30px !important;}”][vc_column_inner width=”1\/3″][vc_column_text css=””]Microsoft Windows 7
\nMicrosoft Windows 8
\nMicrosoft Windows 8.1
\nMicrosoft Windows 10*
\nMicrosoft Windows 11*
\nMicrosoft Windows Server 2008
\nMicrosoft Windows Server 2008 R2
\nMicrosoft Windows Server 2012
\nMicrosoft Windows Server 2012 R2
\nMicrosoft Windows Server 2016
\nMicrosoft Windows Server 2019[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”2\/3″][vc_column_text css=””]* Depending on the use of the software, there may be restrictions (e.g. when attaching e-mail attachments via drag & drop).<\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text]Terminal server environments:<\/strong><\/p>\n
\nMIFARE DESFire EV2
\nLegic Advant
\nJava Card OS 2.1.1, 2.2+, 3.0.1, 3.0.4
\nMultos
\nStarcos
\nYubiKey 5<\/p>\n
\nBlowfish (448bit)
\nIDEA (128bit)<\/p>\n