{"id":5012,"date":"2021-11-09T18:25:52","date_gmt":"2021-11-09T17:25:52","guid":{"rendered":"https:\/\/www.digitronic.net\/?page_id=5012"},"modified":"2024-09-24T09:07:13","modified_gmt":"2024-09-24T07:07:13","slug":"encryption","status":"publish","type":"page","link":"https:\/\/www.digitronic.net\/en\/encryption\/","title":{"rendered":"Encryption"},"content":{"rendered":"

[vc_row][vc_column el_class=”bild”][vc_single_image image=”7991″ img_size=”full”][\/vc_column][\/vc_row][vc_section][vc_row][vc_column width=”4\/5″][vc_column_text el_id=”contact” el_class=”anker”]Anker[\/vc_column_text][vc_column_text]<\/p>\n

Reliable data encryption with HiCrypt\u2122<\/h1>\n

[\/vc_column_text][vc_column_text css=”.vc_custom_1705051722504{margin-bottom: 20px !important;}”]Unencrypted data is a risk for your company on several levels. For example, data can be stolen by criminals or misused internally by unauthorised individuals. Administrators in particular often feel exposed to the general suspicion that they can see everything in the company.<\/span>\u00a0<\/span><\/p>\n

Therefore, ensure more digital privacy in your company now! HiCrypt\u2122<\/strong> not only protects your company data externally, but also develops access management for your fellow employees under their own responsibility, even independently of the IT administration.<\/span><\/p>\n

Use <\/span>HiCrypt<\/span>\u2122 <\/span><\/strong>to<\/span> encrypt<\/span> data<\/span> on network <\/span>drives<\/span> (<\/span>or<\/span> UNC-<\/span>mounted<\/span> folders<\/span>) and <\/span>ensure<\/span> that<\/span> only<\/span> the<\/span> group<\/span> of<\/span> people<\/span> in <\/span>possession<\/span> of<\/span> the<\/span> corresponding<\/span> key<\/span> can<\/span> view<\/span> the<\/span> confidential<\/span> data<\/span>. <\/span>No<\/span> additional <\/span>training<\/span> process<\/span> is<\/span> required<\/span> for<\/span> users<\/span>, <\/span>as<\/span> HiCrypt<\/span>\u2122 <\/span><\/strong>runs<\/span> completely<\/span> invisibly<\/span> in <\/span>the<\/span> background<\/span> so <\/span>that<\/span> they<\/span> can<\/span> continue<\/span> to<\/span> work<\/span> in <\/span>their<\/span> familiar<\/span> Windows <\/span>environment.<\/span><\/span>[\/vc_column_text][\/vc_column][vc_column width=”1\/5″ el_class=”ansprechpartner”][vc_column_text el_class=”gruen_weiss”]<\/p>\n

I’m here for you!<\/strong><\/p>\n

[\/vc_column_text][vc_column_text]\"Foto[\/vc_column_text][vc_column_text css=”.vc_custom_1672673540119{margin-bottom: 50px !important;background-color: #f7f7f7 !important;}”]<\/p>\n

Benjamin Prskawetz<\/strong>
\nT.I.S.P. Consultant IT\u00a0Security
\nSales & Technical Customer Service
\n+49 371 815 39-213<\/a>
\n
bp@digitronic.net<\/a><\/p>\n

[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section css=”.vc_custom_1635847672356{margin-top: 50px !important;}”][vc_row full_width=”stretch_row” css=”.vc_custom_1635847665787{background-color: #f1f1f3 !important;}”][vc_column css=”.vc_custom_1635847736596{margin-top: -30px !important;}”][vc_column_text]<\/p>\n

Download directly here and test free of charge for 30 days:<\/h3>\n

[\/vc_column_text][vc_column_text el_class=”download_button”]<\/p>\n

Download<\/a><\/p>\n

[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_row][vc_column][vc_column_text]HiCrypt<\/span>\u2122 <\/span><\/strong>is<\/span> ideal <\/span>for<\/span> implementing<\/span> legal <\/span>requirements<\/span> in <\/span>accordance<\/span> with<\/span> European GDPR <\/span>standards<\/span>, ISO 27001, <\/span>TiSax<\/span> and NIS-2. <\/span>Of<\/span> course<\/span>, <\/span>you<\/span> can<\/span> also <\/span>secure<\/span> sensitive <\/span>data<\/span> from<\/span> groups<\/span> worthy<\/span> of<\/span> protection<\/span> in <\/span>accordance<\/span> with<\/span> the<\/span> Whistleblower <\/span>Protection<\/span> Act. This <\/span>makes<\/span> HiCrypt<\/span>\u2122 <\/span><\/strong>the<\/span> ideal <\/span>solution<\/span> for<\/span> network <\/span>drive<\/span> encryption<\/span> for<\/span> companies in critical infrastructure<\/span> and all <\/span>companies<\/span> that<\/span> protect<\/span> data<\/span> in <\/span>their<\/span> HR, <\/span>administration<\/span> or<\/span> finance<\/span> departments<\/span>.<\/span><\/span>\u00a0<\/span>[\/vc_column_text][vc_row_inner][vc_column_inner width=”1\/4″][vc_column_text el_class=”gruen”]<\/p>\n

<\/i> Product videos<\/a><\/h3>\n

[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/4″][vc_column_text el_class=”gruen”]<\/p>\n

<\/i> Advantages<\/a><\/h3>\n

[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/4″][vc_column_text el_class=”gruen”]<\/p>\n

<\/i> Case study<\/a><\/h3>\n

[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/4″][vc_column_text el_class=”gruen”]<\/p>\n

<\/i> Technical info<\/a><\/h3>\n

[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_section css=”.vc_custom_1593069872902{margin-top: 30px !important;}”][vc_row full_width=”stretch_row” css=”.vc_custom_1635855994730{background-color: #f1f1f3 !important;}”][vc_column][vc_column_text el_id=”case_study” el_class=”anker”]Anker[\/vc_column_text][vc_column_text]<\/p>\n

Practical example: Saarland Police Medical Service<\/h2>\n

[\/vc_column_text][vc_column_text]<\/i><\/span> There is no absolute security, but we have done everything possible for it. HiCrypt\u2122 ensures that police officers’ medical data can be managed securely and is only accessible to authorized persons.<\/em><\/p>\n

Kr\u00e4mer, person responsible for the technical implementation, Medical Service Police Saarland<\/em><\/p>\n

[\/vc_column_text][vc_column_text el_class=”gruen”]<\/p>\n

<\/i> Read the case study now!<\/a><\/h3>\n

[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section css=”.vc_custom_1593069872902{margin-top: 30px !important;}”][vc_row][vc_column width=”1\/2″][vc_column_text el_id=”video” el_class=”anker”]Anker[\/vc_column_text][vc_column_text]<\/p>\n

How HiCrypt\u2122 works –
\nsimply explained!<\/h2>\n

(German)[\/vc_column_text][vc_column_text]Secure and user-friendly:<\/strong>\u00a0With HiCrypt\u2122, there is no change to the way users are accustomed to working. Documents are automatically encrypted and decrypted depending on permissions.[\/vc_column_text][vc_video link=”https:\/\/www.youtube.com\/watch?v=h4jrh81OI4k”][\/vc_column][vc_column width=”1\/2″][vc_column_text]<\/p>\n

Produktvideo – So sch\u00fctzt HiCrypt\u2122 Ihr Unternehmen<\/h2>\n

(German)[\/vc_column_text][vc_column_text]More than just encryption:<\/strong> Various features cover different use cases and bring both security and convenience to your employees’ workstations.[\/vc_column_text][vc_video link=”https:\/\/www.youtube.com\/watch?v=LHRIVR_RdeQ”][\/vc_column][\/vc_row][\/vc_section][vc_section css=”.vc_custom_1636378265554{margin-top: 30px !important;}”][vc_row full_width=”stretch_row” css=”.vc_custom_1671731050883{margin-bottom: 0px !important;background-color: #97be0d !important;}” el_class=”gruen_weiss”][vc_column width=”1\/2″][vc_column_text el_class=”anker” el_id=”advantages”]Anker[\/vc_column_text][vc_column_text]<\/p>\n

Advantages of HiCrypt\u2122 at a glance:<\/h2>\n

[\/vc_column_text][vc_column_text]<\/p>\n