17 years helping Singaporean businesses
choose better software

LAN Crypt File and Folder Encryption

LAN Crypt File and Folder Encryption

What Is LAN Crypt File and Folder Encryption?

u.trust LAN Crypt adds the extra-layer of security to your data. With its role-based access rights management it enables you to avoid external access (e. g. by attackers or external consultants with administrative rights) as well as unauthorized internal access (e. g. by network administrators) within your organization. Given that, it is the ideal solution to ensure compliant data management.

The cryptographic keys used to encrypt your data are solely stored in a central data base or in the key ring at the users’ local machine so you are 100% independent from the (cloud) providers you may use.

On top, u.trust LAN Crypt follows a strict role split approach: The network administrator can access and manage files and the security officer manages keys and security policies. This ensures a complete separation of network administration and security management.

Who Uses LAN Crypt File and Folder Encryption?

Designed for businesses of all sizes and all in industries.

LAN Crypt File and Folder Encryption Software - u.trust LAN Crypt Installer
LAN Crypt File and Folder Encryption Software - u.trust LAN Crypt Separation of Duties
LAN Crypt File and Folder Encryption Software - u.trust LAN Crypt Example

Not sure about LAN Crypt File and Folder Encryption? Compare with a popular alternative

LAN Crypt File and Folder Encryption

LAN Crypt File and Folder Encryption

(0)
No pricing found
Free version
Free trial
11
5
0.0 (0)
0.0 (0)
0.0 (0)
VS.
Starting Price
Pricing Options
Features
Integrations
Ease of Use
Value for Money
Customer Service
US$2,000.00
year
Free version
Free trial
145
No integrations found
4.4 (2,081)
4.6 (2,081)
4.2 (2,081)
Green rating bars show the winning product based on the average rating and number of reviews.

Other great alternatives to LAN Crypt File and Folder Encryption

MySQL
Top rated features
Backup and Recovery
Database Support
Secure Data Storage
Mailock
Top rated features
Encryption
File Encryption
Secure Login
Confidencial
Top rated features
No features have been rated by reviewers for this product.
Cypherdog Encryption
Top rated features
Encryption
File Encryption
Threat Protection
MOVEit
Top rated features
Encryption
P2P Encryption
Real Time Synchronization
Virtru
Top rated features
Email Attachment Protection
Encryption
Threat Protection
Fortanix Data Security Manager
Top rated features
No features have been rated by reviewers for this product.
GoodAccess
Top rated features
Remote Access/Control
VPN Software
VPN Tunneling
Sealit
Top rated features
Application Encryption
Authentication
Encryption

Software found in