Conpal LAN Crypt available for macOS

Conpal LAN Crypt available for macOS

Share post

The enterprise encryption solution Conpal LAN Crypt is now also available for macOS devices. Mac users can use it to exchange files with role-based encryption from the corporate network among users of all common platforms.

Due to the user-specific cryptography, Conpal LAN Crypt allows companies to easily implement data authorization concepts. Once set up, the data remains encrypted regardless of where it is located. The solution ensures that the files can only be decrypted by authorized persons. The high encryption standard is particularly suitable for regulated industries and security-critical work areas such as research and development. The solution also supports smart card-based keys.

Conpal LAN Crypt Client for macOS

The new Conpal LAN Crypt Client for macOS enables secure, encrypted file exchange and policy-compliant access for Mac users in companies. You can not only exchange encrypted files with each other, but also with users of all common end devices in companies such as Windows PCs, iPhones, iPads and Android devices.

The solution enables organizations and companies to implement a data-centric security strategy: companies can easily apply role and authorization concepts for data of different sensitivity categories to the entire workforce. All users are assigned a profile which authorizes them to open certain files according to their release level. It also determines which key is used to subsequently encrypt files. Once set up, the data remains encrypted regardless of its storage location - regardless of whether it is on network storage, local hard drives, optical media, USB sticks, memory cards, on-premises or in the cloud. This is made possible by asymmetric encryption, in which the data is only decrypted for authorized user profiles. The use of smart card-based keys is possible for environments with special security requirements.

Easy to install and manage

Conpal Lan Crypt is now also available for macOS (Image: Conpal).

IT administrators can easily distribute Conpal LAN Crypt Client for macOS via an MDM / UEM solution (Mobile Device Management / User Environment Management). The assignment of access rights for each user by the security officer is rule-based. Directory services are integrated so that installation and configuration can be carried out within a short time, even in large organizations. In the event of changes in the authorization concepts, the automated key and policy management automatically updates all affected user profiles.

High encryption standard and user-friendly performance

Conpal LAN Crypt uses the AES-256 encryption standard with 128 bits, each in XTS and CBC mode. Certificates can be imported from a public key infrastructure. The generation of RSA keys up to 4096 bits is supported. Users are not affected by this and can keep their usual workflows. This is ensured by the encryption and decryption of the data in the background in conjunction with optimized performance.

Compatibility with other platforms

The new client for macOS complements the solutions already available for Windows, iOS and Android. All solutions are compatible with each other, so that, for example, rules and keys for the macOS client can be imported from an already implemented Conpal LAN Crypt solution.

More at Conpal.de

 


About Conpal

Conpal GmbH is a leading independent provider of IT security solutions for the protection of confidential data through encryption and authentication, based in Germany. This protection covers all data, regardless of where it is stored - locally, on network servers, in cloud environments or on mobile devices. The solutions from Conpal ensure in numerous companies and organizations in business and public administration that sensitive information can only be accessed by authorized users. They meet the requirements of large companies, are flexible in the mapping of organizational structures, easy to roll out and scalable.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more