Type: Service, Product - Service
Category: Privacy, Security
Sub-categories: Authentication, Data Protection, Encryption, Identity & Access Management

HiCrypt 2.0. : Tailored encryption taking the security of your data in your own hands

Problem
The comprehensive protection of confidential and secret information, namely information security, plays in today's global world a greater role and is a great challenge for all companies. The amount of data they need to process is constantly increasing and the risk of digital industrial espionage, sabotage or data theft is becoming ever greater. This has also been confirmed by a recent study conducted by BITKOM Bundesverband Informationswirtschaft, Telekommunikation und neue Medien e.V., where 51 % of the companies interviewed stated that they had been victims of attacks. Yet it is interesting to note that almost two thirds of company attacks have been caused “on-site”. It is targeted data theft by current or former employees. Besides patents, construction plans or concepts for products and services also marketing, customer data, production schedules or employee profiles are of considerable interest. The damage caused by digital industrial espionage, sabotage or digital identity theft in companies amounts to 51 billion Euros currently according to a study of BITKOM.

Solution (Value Proposition)
After the launch of HiCrypt™ in 2012, as described above, the need for solutions for protection of confidential and secret data has increased steadily. digitronic® also faced this challenge and is now applying with the successor HiCrypt™ 2.0 for the price for the best “Cloud Security Product of the Year 2015”. HiCrypt™ 2.0 is easy to install and intuitive to operate. HiCrypt™ 2.0 not only encrypts data on network drives, and thus enables common access to encrypted files and folders, but also supports 2-factor authentication using security USB smart card tokens and smart cards. Scenarios are feasible, in which user's access to protected data is only possible with tokens and matching pin (knowledge and ownership).
HiCrypt™ 2.0 offers the possibility to define individual password policies to enforce automated frequently required security policies in company environments in relation to passwords also in HiCrypt™ 2.0. Various criteria such as password length, complexity and validity guarantee therefore very flexible implementation. The encryption and decryption takes place on client side. As a result both the data transfer to the filing location and file storage are encrypted. Users not authenticated by HiCrypt™ 2.0 have no chance to view the encrypted information. Only the administrator manages access permissions to the encrypted data with HiCrypt™ 2.0 (sole key property). He determines who can decrypt the data: whether he alone or in addition trusted persons. As a manufacturer we guarantee that no "backdoors" have been installed in the software.

HiCrypt™ 2.0 in the Cloud: More and more providers of online hard drives offer the possibility to integrate these as a network drive in the PC. HiCrypt™ 2.0 supports these network drives. This means that data can now be stored safely from unauthorized access in the Cloud and, if necessary be exchanged with relatives, friends, colleagues or customers.

Disaster recovery: In cases where access to an encrypted network drive is no longer possible HiCrypt™ 2.0 offers options for recovery. So that after the initial encryption of a drive a recovery key can be exported. By this means recovery of encrypted network drives is guaranteed.

System administrators: On access to information, administrators shall quickly appreciate the benefits of HiCrypt™ 2.0. HiCrypt™ 2.0 encrypts only the contents of the files. Folder structure and file names are fully preserved and not encrypted. Thus, backup is supported without restrictions. Seite 8 von 22

HiCrypt™ 2.0 for mobile devices: For mobile access to encrypted data by HiCrypt™ 2.0 an App for Smartphones and pads is available. This App provides anywhere, anytime access to your confidential information. It is completely irrelevant whether you are accessing your own network or Cloud storage.

Key Differentiators:
The idea to develop such kind of product is still state-of-the-art, because there is no direct comparable solution on the market. Actually available products on the market use a different approach, e.g. encryption of entire disks, drives and directories. This approach includes even security and confidentiality of data and usage is slower and less comfortable. HiCrypt™ 2.0 uses a different way – our solution is encrypted and decrypted data at the inlet and outlet connection of the client (local computer) or to the internet based network. The software itself works closely with the hardware - virtually on machine level. Manipulation by external forces is impossible. The market for encryption software in the world is characterized by a variety of different products. In particular, the support of legal compliance guidelines through appropriate solutions is unfortunately not yet implemented by IT users, as expected by software suppliers. Also a 100% comparability of the solutions on the existing worldwide market currently offered is, due to the different development approaches, not so easy to implement. So therefore we restrict ourselves to our highlights of HiCrypt 2.0:

1) No backdoor guarantee, made in Germany
2) Source code in our hand
3) Guarantee of exclusive ownership of your encryption key
4) 2 factor authentication with USB smartcard token or smartcard
5) Disaster recovery
6) Support of individual password policies
7) Security guidelines for companies
8) Encryption service
9) Devices & terminal servers, floating licenses
10) Access for multiple persons
11) HiCrypt™ 2.0 in the Cloud (for Online Storages and Desktop as a Service)
12) Mobile access
13) Intuitive and easy to understand

Supporting Technology (the 'magic')
The product HiCrypt™ 2.0 was introduced to the international market on 07.01.2015 and is offered in German and English. Should there prove to be demand on the market for a French and/or Spanish version, this would also be realized in the short term. Additional language variants would of course be possible. Demand = Supply. HiCrypt™2.0 is offered as a client version, as a terminal-server version and as a floating license and supports the following Microsoft Operating Systems (all operating systems are supported for the x86 as well as for the x64 edition):
Microsoft Windows XP, Microsoft Windows Vista, Microsoft Windows 7,Microsoft Windows 8,Microsoft Windows 8.1,Microsoft Windows 10,Microsoft Windows Server 2003,Microsoft Windows Server 2003 R2,Microsoft Windows Server 2008,Microsoft Windows Server 2008 R2,Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2.
HiCrypt™ 2.0 provides the operational environment in which users can operate the system with ease and simplicity.

Team Experience

The basic idea for the development of encryption software came in 2005, based on a query from a faction in the city hall (Party X), which communicated the CEO M. Kirchhoff (Dipl.Ing.) that the existing factions in the future will only be allowed to work in the city hall on one server and so one sees the danger that unauthorized persons from other factions might gain access to confidential data belonging to Party X. Mr. Kirchhoff confronted the CTO S. Ranft (Dipl.Ing.) digitronic® with this problem and so the first encryption software for network drives named Crypted Group Share was developed within a year. The market introduction and distribution began in 2006, also as OEM Version by the name of DriveCrypt Plus.

Among the developers in 2005/2006 was also B. Würsig, whose master’s thesis on the topic: „Encryption of CIFS-Shares“, written at the Technical University of Chemnitz, Faculty for Computer Science, Chair Real-Time-Systems, contributed significantly to the development of Crypted Group Share and later also in HiCrypt™ and HiCrypt™ 2.0. Also part of the team of developers was S. Grzeszczuk, whose master’s thesis: “Conception and Realization of a Token Management Systems as Client-Server-Application for the Authention Safety Suite“, submitted on 4.21.2005 at the Saxon University of Applied Sciences Zwickau (FH), Division of Physical Technology/ Specialized Group for Computer Science, also influenced the development of this software, as did the bachelor’s thesis of another member of the Development Team: P. Böttner, who dealt with the topic: “Cross-Platform-Development of a HiCrypt™ Clients” in his bachelor’s thesis which was also submitted to the Saxon University of Applied Sciences at Zwickau on 2.12.2013. This bachelor’s thesis and related know-how especially contributed to the product development of HiCrypt™ 2.0 which was introduced to the market on 7.1.2015.

Dipl.-Kfm. Peter Liebing, Head of Sales and Marketing is another team member of the total of 12 permanent employees today; he was recruited to the company by the executive management in 2012. He was recruited due to his long profession experience and career progress (since 1981 – 2010: Sales (direct sales) and Support NCR GmbH, Product Manager PC NCR GmbH, Product Manager Toshiba, CEO AVM International (development int. Channel business worldwide), building up channel business for other German companies). successfully building up the division of sales of security products, but also for designing marketing. The increases to sales in this segment since 2012, which show every increasing brand awareness of digitronic® demonstrate that this was certainly not a mistake.

Contacts for clients, press and partners:
Digitronic computersysteme gmbh
Oberfrohnaer Straße 62
D-09117 Chemnitz
Germany
Tel: +49 (0) 371 81539-0
Internet: www.digitronic.net
E-Mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

Getting Started

Which type of company are you? Choose one of the options below and get a head-start.

Framework Overview

Navigate through the different parts of the Framework

leeg

Joomla! Debug Console

Session

Profile Information

Memory Usage

Database Queries