Features of HiCrypt™ 2.0

Comprehensive protection for confidential and secret information is playing a larger and larger role in today’s global world and is a great challenge for every business, whether an LLC or a major international company. HiCrypt™ 2.0 offers the highest degree of confidentiality for your sensitive data. HiCrypt™ 2.0 is for example used by human resources departments, by executive managers, by staff councils, works councils, by construction departments in the automobile supplier industry or by banks.

HiCrypt™ 2.0 encrypts data on network drives and facilitates common access to encrypted files and folders. Where ever you store your documents: whether on the company network, in the home office or in your on-line storage in the cloud, with HiCrypt™ 2.0 you hold the key to the security of your data in your own hands.

Easy use; intuitive operation!

Forget complex applications that assume an extensive IT-infrastructure. HiCrypt™ 2.0 needs neither server-components nor any existing PKI-environments*. HiCrypt™ 2.0 is focused solely and exclusively on securing your data on the network drives and yet still presents a simple, easy-to-understand and intuitively operated design. References

Save time + money with HiCrypt™ 2.0!

Avoid expensive and time-consuming evaluation phases with complex and clumsy applications, whose manufacturer also requires that you purchase a minimum number of licenses. You receive HiCrypt™ 2.0 with a one-time fee as a single licence, terminal server licence along with a floating licence! Your requirements and need for the protection of you confidential data is top priority.

Invest in your security now!

Are you really aware of the dangers arising from theft of confidential information? Perhaps you have already been a victim of such an attack on your person or on your company? Minimise risks of this kind for you or for your company. Invest in the minimal expenditure of time and money** required to implement HiCrypt™ 2.0 and see an immediate, enormous increase in your data security.

* There will be no further costs for you than the licenses and optional maintainance. You do not need to pay for required hardware and server components or any other parts of the infrastructure.
** Compared to the damage you could have from the theft of your data.

HiCrypt™ 2.0 encrypts data on network drives

HiCrypt™ 2.0 encrypts data on network drives and allows shared access to the encrypted data and files. The encryption and decryption of the data takes place on the local computer. This ensures that the transmission of the data as well as the place to keep them will be encrypted. Unauthorized personal does not have the possibility to access the encrypted information.

For the encryption of the data we use approved standard procedures. You will find more detailed information about the used algorithms here.

Guarantee of exclusive ownership of your encryption key

With HiCrypt™ 2.0 you alone are responsible to manage the access rights to the encrypted data. You alone will decide who will be able to decrypt the data: either only you or any other trusted person additionally. Nobody else will have access to the encrypted information on your encrypted network drives. We guarantee that we as the developers of the software have not implemented any backdoors. We ensure you that you will be the only person who will have the complete control of the information for the key to the encrypted data.

This is your guarantee of exclusive ownership of the encryption key!

Shared access

In contrast to common container encryption, with HiCrypt™ 2.0 several users will have access to the same encrypted network drive and will be able to work with the encrypted data at the same time. Naturally prerequisite is that you have granted access to your documents to serveral users.

With HiCrypt™ 2.0 you have the confidentiality of your data in your own hands.

Manage the access rights to the encrypted network drive

Our integrated user management allows you to grant access to the encrypted data to any additional user you need. The user management works independently from local and domain user accounts. This enables you to manage your users without any administrative rights so that the security of your data will stay in your own hands.

We have used a two staged concept to grant the permissions for accessing the data. After the initial encryption you will be automatically the manager of the encrypted network drive so that you will have all the required access rights for managing the encrypted network drive. Now you can add more users who can access the encrypted network drive. You can choose if you want to grant read and write access or if you want to add additional managers with the same access rights as you have.

HiCrypt™ 2.0 in the Cloud (for Online Storages and Desktop as a Service)

More and more providers of online hard disks offer the possibility to connect them to the computer as a network drive. HiCrypt™ 2.0 supports these network drives. This enables you to store your data in the Cloud and share them with your friends, colleagues and even your customers, protected from any unauthorized access.

The term “Cloud” does not only mean that online hard disks can be encrypted with HiCrypt™ 2.0. Even Terminal Server services can be made much more secure with HiCrypt™ 2.0. By implementing HiCrypt™ 2.0 as an encryption software you can trust the provider that he can not access your data as well as you are respecting the strict German privacy law, as no information will be stored unencrypted with external providers. As HiCrypt™ 2.0 supports Terminal Server environments you can use it for a wide variety of Desktop as a Service applications.

Interaction with HiCrypt™ 2.0

Beside its most important feature – to protect your data from unauthorized access – HiCrypt™ 2.0 as well offers a simple and intuitively usable user interface, which is limiting the necessary steps to protect your data to the most essential, and ensures that it is easy to understand and comprehensible. Many other solutions which you will find or already have found on the market are packed with functions. This enormous complexity makes them hard to use. The training periods for such complex software are very long. But not for HiCrypt™ 2.0. Usually, the time you need to encrypt a network drive and continue with your usual work, is much shorter than the download time of some of the other solutions.

Disaster Recovery

In case that you can not access an encrypted network drive anymore, HiCrypt™ 2.0 offers the option of data recovery. After the initial encryption of the network drive you can export a data recovery key, which ensures the recovery of the encrypted network drive.

Furthermore HiCrypt™ 2.0 offers serveral possibilities to repair encrypted network drives and bring them back into a condition that the user will be able to work with the data from these drives. Only if all these measures will not work the recovery of an encrypted network drive with the recovery key will be necessary.

System administrators

Although administrators will be disempowered concerning the access of sensitiv data they will soon appreciate the advantages of HiCrypt™ 2.0. HiCrypt™ 2.0 only encrypts the contents of files. Folder structures and file names remain unchanged and will not be encrypted. Thus full backups as well as incremental and differential data backups are innately supported. And the recovery of files and folders will neither be influenced nor restricted. Furthermore all administrators are absolved from accessing sensitive data without authorization.

Users without according HiCrypt™ 2.0 permissions will not be able to access confidential information.

Security guidelines for companies

For the implementation of individual security guidelines HiCrypt™ 2.0 offers suitable procedures to meet the requirements for password security. Logons to encrypted network drives will be done manually by introducing user name and password. This procedure can be made even safer by using smartcards or USB smartcard token being supported with the SafeSign Identity Client (e.g. MARX CrypToken MX2048 JCOP or MULTOS). Furthermore HiCrypt™ 2.0 supports the implementation of the four eyes principle for all administrative actions at the encrypted network drive. These control mechanisms can be used company wide as a condition for the use of HiCrypt™ 2.0.

Security guidelines are frequently required within business environments. HiCrypt™ 2.0 ensures that custom password policies can be defined as part of its functuionality. Various password criteria such as the length, complexity, and period of validity therefor allow a flexible use.

Installation & sollout strategies for companies

HiCrypt™ 2.0 is limited in its features to the most essential functions you need to protect your data. It is a client based software and will be installed on the computers where you work with confidential data. There are no server components, neiter a complex IT infrastructure is required. Directory services are no condition for the implementation of HiCrypt™ 2.0.

For a fast and efficient implementation of HiCrypt™ 2.0 in the everyday tasks of a company, HiCrypt™ 2.0 supports a rollout strategy where the software will be installed automatically at the client computers.

More detailed information to the automatic installation of HiCrypt™ 2.0 you will find in our Frequently Asked Questions.

Support of all common Windows operating systems

HiCrypt™ 2.0 supports all Microsoft operating systems from Windows 7 or Windows 2008 Server and later (x86 and x64 edition, client as well as server based operating systems). Here you will find a complete list of all supported operating systems.