Mobile working with encrypted documents

Share post

Security in your pocket: mobile work with encrypted documents from the company network on iOS and Android. Mobile clients for the encryption solution Conpal LAN Crypt.

Process corporate documents securely on smartphones and tablets - this is made possible by the enterprise encryption solution Conpal LAN Crypt with its new mobile clients. They can be used by employees on iOS and Android devices to work with encrypted files from the company network. The protection of the data remains persistent, no matter how it reaches the device: via email, via cloud storage such as OneDrive or Dropbox, via another app or via a direct connection. Conpal LAN Crypt encrypts all data based on roles. This means that every employee can access exactly those files on their mobile device for which they are authorized. Back in the office, he can continue working on his workstation computer as usual without the data protection being interrupted. This enables secure and GDPR-compliant mobile work, even with highly sensitive data. Conpal is one of the leading independent German providers of IT security solutions for protecting confidential data through encryption and authentication.

Role-based encryption of data

At its core, Conpal LAN Crypt offers persistent, role-based encryption of data. In this way, users in companies and authorities protect sensitive information from unauthorized external access. At the same time, they ensure that only authorized persons have access within the organization. This protection extends to all data storage media: network drives, local hard drives, optical media, USB, memory sticks / cards as well as storage technologies on-premises or in the cloud. With the two new clients Conpal LAN Crypt for Android and Conpal LAN Crypt for iOS, Conpal is now also extending the protection to mobile devices.

Features and security

For the administrator, the assignment of keys and policies for mobile devices means almost no additional work because it is fully integrated into the administration of conpal LAN Crypt. The administration interface allows users to be imported from directory services with just a few settings to create the necessary sets of rules for the automatic distribution of keys throughout the organization.

Maximum security through cryptographic procedures

Encryption solution Conpal LAN Crypt receives an Android client (Image: Conpal).

With the new mobile clients, the user can download and decrypt files. They support multi-window such as slide over and split view, dark mode and “open with” actions for convenient access from other applications. The protection of the content is guaranteed by a sandbox system: All decrypted data remains in the context of the Conpal LAN Crypt app and is deleted after use. No plain text content can be seen in preview mode. The app also forces device security to be activated. Conpal LAN Crypt encrypts files with AES 256 and 128 bit, each in XTS and CBC mode. Certificates can be obtained from a PKI, whereby RSA keys up to 4096 bits are supported.

Enterprise-grade roll-out

The sophisticated administration concept enables fast and uncomplicated integration into the IT security architecture and thus simplifies the use of mobile clients in companies. The users download the app via the Google Play Store or the Apple App Store or obtain it as a push installation through MDM / UEM solutions. The import of certificates and policies takes place via a central distribution by the organization or the download via encrypted web communication.

More at Conpal.de

 


About Conpal

Conpal GmbH is a leading independent provider of IT security solutions for the protection of confidential data through encryption and authentication, based in Germany. This protection covers all data, regardless of where it is stored - locally, on network servers, in cloud environments or on mobile devices. The solutions from Conpal ensure in numerous companies and organizations in business and public administration that sensitive information can only be accessed by authorized users. They meet the requirements of large companies, are flexible in the mapping of organizational structures, easy to roll out and scalable.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more