- Encryption of subject, text, and attachments
- Secured using AES and TLS encryption
- Integrated into Microsoft Outlook and IBM Notes
Large File Transfer
- Files of any size
- Intuitive web-interface and add-ins
- Automation via script or API
- Full audit trail
- Maintain control over the data you exchange
- Scanned for malware
Easy to use
For employees and external contacts
How Cryptshare works
A short animation
Want to see Cryptshare in action?
More than 2,500,000 satisfied business users
What our customers say about Cryptshare:
"Like many specialist engineering companies we exchange files with customers, suppliers and partners very often. By using Cryptshare we reduced the effort and the cost for these file transfers significantly. In addition Cryptshare increased safety and security of the content of the files compared to the previous use of e-mail. The very easy-to-use interface makes user acceptance of Cryptshare very fast and the acceptance of Cryptshare is so good that even in-house file transfers are now made via Cryptshare."
Klaus Knayer, CIO
Recaro GmbH & Co. KG
"Searching for a secure way to transfer large files I discovered Cryptshare. The solution instantly drew my attention because it addressed all our requirements. We started with Cryptshare in the Netherlands. Based on enthusiastic responses from our users we have now deployed it throughout Europe. For us it is a far better option than FTP or sending confidential data via couriers. We can exchange files with our external partners who get access to the files we sent them via a user friendly branded interface in the browser."
Jeroen de Zwart, Senior Network Engineer
YAMAHA MOTOR EUROPE
"Having looked at several solutions we found them mostly very complex or too expensive. Finding Cryptshare we saw how it could solve many of our compliance and security needs. The fact that it also reduced the load on and costs of our e-mail services was a bonus. Cryptshare is really simple to use which was important for us as it allowed us to deploy the solution fast and without training. If a user can use e-mail then they can use Cryptshare. I would strongly recommend any business to try it."
Angus Macrea, IT Security Manager
Blog & News
On Cryptshare and Secure Electronic Communication
200,000 computer systems worldwide have been put out of action since Friday 12th May by a Ransomware named "WannaCry". The attack appears to have stopped for the time being. However, security experts expect further attacks by the same malicious software in a slightly modified variant.
Today, we briefly and concisely discuss an overview of the Who - How - Where - What - When - Why of the General Data Protection Regulation. Below in the article, the interested reader can find additional information on the European Data Protection Regulation (1).
Computers down? Patient reports are handed over personally. Back to the hospital of the 1980s. Inconceivable? In fact a hospital in Germany had to change its mode of operation last year, after its network was paralysed by the Trojan, Locky. The malicious software was smuggled in by an infected e-mail attachment and encrypted all data, making the digital exchange of patient data impossible.