Secure email

Send Large Files

"Like many specialist engineering companies we exchange files with customers, suppliers and partners very often. By using Cryptshare we reduced the effort and the cost for these file transfers significantly. In addition Cryptshare increased safety and security of the content of the files compared to the previous use of e-mail. The very easy-to-use interface makes user acceptance of Cryptshare very fast and the acceptance of Cryptshare is so good that even in-house file transfers are now made via Cryptshare."

Klaus Knayer, CIO
Recaro GmbH & Co. KG

"Searching for a secure way to transfer large files I discovered Cryptshare. The solution instantly drew my attention because it addressed all our requirements. We started with Cryptshare in the Netherlands. Based on enthusiastic responses from our users we have now deployed it throughout Europe. For us it is a far better option than FTP or sending confidential data via couriers. We can exchange files with our external partners who get access to the files we sent them via a user friendly branded interface in the browser."

Jeroen de Zwart, Senior Network Engineer

"Having looked at several solutions we found them mostly very complex or too expensive. Finding Cryptshare we saw how it could solve many of our compliance and security needs. The fact that it also reduced the load on and costs of our e-mail services was a bonus. Cryptshare is really simple to use which was important for us as it allowed us to deploy the solution fast and without training. If a user can use e-mail then they can use Cryptshare. I would strongly recommend any business to try it."

Angus Macrea, IT Security Manager
Cornwall Council

How to satisfy your compliance requirements and users at the same time – while securing your digital communication.

Table of contents:

  1. What is shadow IT?
  2. How shadow IT comes about
  3. Risks of shadow IT
  4. Understanding the user
  5. Getting a solution that combines security and convenience

Pointsharp GmbH is committed to protecting and respecting your privacy. We use your personal data to administer your account and to provide the products and services you have requested.

From time to time, we and our partners may want to inform you about our products and services and other content that may be of interest to you. If you give us your consent, we will contact you your provided email address.

You may revoke your consent at any time for the future by clicking the unsubscribe link in an email you have received. Further information on the processing of your personal data and your rights in our data protection information can be found in our privacy notice.

By submitting the form, your personal data will be processed by Pointsharp GmbH for the purposes stated above.

Click here to read our complete Privacy Policy.

Your advantages with Cryptshare

Why millions of users already appreciate Cryptshare

Prevent shadow IT

Prevent shadow IT

Employee’s often need to send large attachments, larger than what regular email can cope with.

Do you know what systems they are using to achieve this?

Cryptshare enables you to keep track of emails being sent out, Giving you your security back.

Learn more now

Sending files of any size safely

With Cryptshare, sharing large files is no longer a challenge. The restraints of SMTP are a thing of the past.

File size restrictions are removed in popular email clients, limits can be set by the administrator.

More Infos
Sending files of any size safely
Protection of confidential information

Protection of confidential information

Use Cryptshare to send and receive emails and large files securely.

Compared to available technologies, e.g. S/MIME and PGP, Cryptshare also offers the benefit of encrypting metadata such as the email subject.

Learn more

GDPR compliant Email

Classifying data is an important compliance standard required by the GDPR.

Our Data Classification creates an easy tool set for users, promoting awareness of email security and ensuring lasting protection against compliancy penalties.

Get More Infos
GDPR compliant Email

Prevent Shadow IT

How to meet the demands of compliance requirements and users at the same time

When employees use unauthorized software the company immediately loses control over files that are stored on publicly available servers outside of their own infrastructure. This can already be an infringement of laws and regulations in many industries that handle, store, and exchange sensitive data of customers, patients, or clients. The goal is to understand the user and get a solution that combines security and convenience.

Cryptshare in figures

SatisfiedUsersNumberShort m

satisfied users worldwide

in CustomersInCountriesNumber


CustomersNumber +

Corporate customers

100 %

Secure Communications



Contact Our UK &amp

Ireland Consultant

Stephan Atkins

Stephan Atkins
General Manager - UK & Ireland