18 - 20 October 2016 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Zoom product LOGO_CryptoTec Zone

CryptoTec Zone

LOGO_CryptoTec Zone

CryptoTec Zone

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.
Your message has been sent.

Would you like to use more facilities and advantages of the platform? Then please log in – or register here.

An error has occurred.

Tap-proof, tamper-proof and forgery-proof communications software for everyone

Snooping has come to an end

The Solution: encryption with a 100% guarantee!

You can do something against attacks from the outside and the inside, you do not have to be a helpless victim of cyber criminalists. With “CryptoTecZone " you are fully protected against divulgement and theft of your sensitive data and data loss is prevented in all phases of your communication process by a matured and from experts globally recognized and highly regarded cryptographic software (including secure interfaces and access controls).

“CryptoTecZone” is currently the most secure communications platform for closed user groups or persons that correspond to each other in real time, edit files, send and store their data and want to be protected against unauthorized access.

WHAT MAKES YOU SAFE AND "CryptoTecZone" so secure?

CryptoTec ID - the native electronic identity card

"CryptoTecZone" generates a tamper-resistant, unique cryptographic digital identity and provides protection against identity theft and forgery. All system participants are confirmed by digital, device- bound signatures and send and receive absolutely fraud-proof. The authenticity of all senders and recipients is monitored. A closed user group enables you to define communication channels "Monitoring 2.0 ". Passwords are superfluous.

CryptoTec Messenger - enables the rapid exchange of information

"CryptoTecZone" ensures tap-proof "end-to-end" encrypted communication over the internal chat system and at the same time checks all data and messages to uncover any possible manipulations.

CryptoTec Transfer - simple data transfers worldwide via drag and drop

"CryptoTecZone" transfers files of any size protected against all forms of attacks on the encrypted tunnel system and ensures your datas integrity even over unstable and unsafe Internet connections like open Hotel WiFi, GPRS or satellite.

CryptoTec Workroom - the highly secure and always shielded workplace

Our CryptoTecZone-Workroom is a high-end solution that allows employees in companies all over the world to correspond in real time and synchronize their files. The synchronization takes place safely within Windows Explorer without having to resort to Web browser-based VPN clients, cloud services or similar solutions. The data exchange takes place highly encrypted and the data and samples are protected from any unauthorized third-party access through its authenticated user circle: "Monitoring 2.0".

The areas of application of our easy to use software are endless. Sensitive data, confidential information, important documents, databases, office applications, CAD files or ERP are always shielded in our Workroom and can be exchanged safely, i.e., "highly encrypted".

CryptoTec Lib – the heart of our communications software

"CryptoTecZone" is based on a cryptographic high-level library especially developed by us, which relies on globally recognized cryptographic methods. Specifically: RSA-4096 asymmetric encryption, AES 256 symmetric encryption, SHA-256 cryptographic hash functions.

Our "CryptoTecZone" Encryption technology keeps all cyber-attacks at bay without any problems. It relies exclusively on internationally recognized encryption standards that meet the most rigorous military requirements. Our solutions are based on a Public Key Infrastructure which ensures the automatic exchange of keys that makes passwords superfluous. Trustworthiness, protection, security and reliability are thus always guaranteed.

In addition, we regularly hire external security companies such as the RedTeam Pentesting GmbH in Aachen to perform penetration tests to verify the continuous suitability for everyday application and the security of our software.

Our goal is the preservation and restoration of confidentiality. No one should pay for technological progress by giving up his or her privacy or even their freedom.

Therefore, we promise:

Communication in stealth mode

There are no entries in your notes.

Show notes

Order your it-sa ticket online in our TicketShop. Save your ticket now!


The selected entry has been placed in your notes!

If you register you can save your notes permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your notes permanently. Use the instant access to exhibitors or products saved – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your notes mobile too! Simply log in and access them at anytime.