Das Leitbild für die Entwicklung von Verschlüsselungen durch comcrypto
comcrypto team

Slogan

Software for secure digital information exchange

Experts for confidential communication.

About our technological field

Cryptography has been part of communications solutions and digital applications in all areas of our lives for 25 years. Since then, powerful cryptographic systems have evolved based on quasi-standards such as PGP or S / MIME, providing high level security when properly deployed. On the other hand, based on these standards, systems have emerged that make secure communication increasingly complex and time-consuming. On the other hand, systems have emerged based on these standards that make secure communication increasingly complex and time-consuming. In addition, due to their complexity, concrete implementations - such as certificate hierarchies become the target of attacks on e-mails.


The advancement of existing systems is a major challenge because the cryptography standards available to date can only address current attack scenarios with disproportionate effort in the IT systems and on the end-user side.


In the German economy alone, damages amounting to an estimated 100 billion euro a year are caused by attacks on e-mails. The majority of companies today, especially small ones, do not use encryption.


Therefore comcrypto uses new, proven, future-proof principles for encryption. Our products are designed for enterprise architectures, especially for SMBs, while still being the ideal gateway to contemporary, EU-compliant, confidential digital communications.


Our products and solutions follow these basic paradigms:

Comcrypto principles

1. Software from Comcrypto must be simple and intuitive to use.

2. Comcrypto always meets the highest possible level of security.

3. Each line of cryptographic source code is developed by comcrypto itself.

Technical excellence

1. One-Time Use of Keys - Perfect Forward Secrecy

2. Highest random and key quality - achieves defense security standards

3. Support of multiple terminals per cryptographic identity

4. Separate handling of signatures and ciphers, with different keys

5. Scalable cipher strength due to interoperability of procedures

Seamless integration into existing IT infrastructures

Security concepts and solutions must always be as integral as they are transparent components of IT systems. Therefore, Comcrypto provides components and applications that can be easily integrated into existing IT infrastructures based on standard protocols such as IMAP.

Security solutions from comcrypto

E-mail communication is one of the biggest risks for businesses on the Internet. This is due to the fact that e-mails are transmitted asynchronously, that is not in a secure client-server transaction as in the web browser. Protect yourself by using our e-mail security products comcrypto MXG and encurity. Benefit from highly secure, confidential communication by e-mail.
Detailed product information can be found in our download area

comcrypto MXG

MXG is the perfect gateway to 100% encrypted outbound email. Every message that leaves the company is encrypted according to a transparent set of rules. All recipients who do not yet use a comcrypto solution will receive a one-way mail that can be read after entering a password in the recipient's browser. MXG therefore enables you to fully comply with the requirements of the EU Data Protection Regulation in the first step. By complementing our e-mail security package with both sender and recipient, MXG can be upgraded to a security solution that allows e-mail encryption to be easily implemented both when sending and receiving. Learn more about comcrypto MXG

encurity.business

encurity is an e-mail application that enables companies and individuals to automatically secure their e-mail communication. Businesses typically have sophisticated e-mail account systems within their domain with thousands of communication participants. The range of application scenarios of encurity in companies is therefore very large. The basis for the concrete installation of encurity or adequate comcrypto components – for example in conjunction with Microsoft Exchange or IBM Lotus Notes – is therefore an initial system analysis with target state description. We are happy to advise you free of charge and without obligation about the concrete procedure needed in your company.

use encurity

encurity.complete

Professionals such as lawyers or notaries are required by law to comply with confidentiality and secrecy regulations. This naturally includes encrypted communication via e-mail. Nevertheless, the application of secure cryptographic solutions in the everyday life of a notary or a law firm isn’t always problem-free. That's why comcrypto provides its email client encurity in a configuration that allows multiple employees in a law firm to communicate securely in parallel, enabling easy integration of new clients into secure communications, as well as the convenience of document management fulfilled in everyday life as well as the legal requirements for archiving.

use encurity

encurity.privat

As an all-round carefree solution, encurity is designed primarily for use in the small-business and private sectors. You can use encurity for both encrypted and unencrypted (ordinary) emails. Simply add contacts that also use encurity to your highly secure communication network through automatic identity verification. An intuitive traffic light system helps you quickly identify which contacts you can send high-security or ordinary e-mail. Use encurity to extend your existing e-mail infrastructure. Keep your e-mail address and existing hardware.

use encurity

Use encurity.privat for free

In drei Schritten zum Schild vor der E-Mail. Registrieren Sie sich jetzt für die Nutzung von encurity.privat. Anschließend erhalten Sie einen Aktivierungscode per E-Mail und können encurity jederzeit herunterladen.

encurity ist aktuell für Windows 7 und neuere Versionen von Windows verfügbar. encurity.privat enthält funktionale Einschränkungen wie beispielsweise die ausschließliche Verwendung eines einzelnen Endgerätes und keine Möglichkeit der Archivierung.

Persönliche Daten angeben
Frau Herr
Nutzungsbedingungen akzeptieren

Vielen Dank für Ihre Anmeldung zur Nutzung von encurity. Sie haben eine E-Mail mit einem Aktivierungscode erhalten. Dieser berechtigt Sie zum Download von encurity. Viel Spaß mit encurity, unserem innovativen E-Mail-Client für vertrauliche Kommunikation.

encurity herunterladen
Anleitung und weitere Informationen

comcrypto.knowhow

The IT security 360 ° workshop on IT security issues is aimed at managers and decision makers in SMEs. Thematic focus is the recognition of the individually given security requirements, the getting to know of IT security core components and a sound estimate between risk and economy. The aim of the workshop is to enable the participants on the basis of the knowledge and tips to be gained, to prepare a strategic, comprehensive, economic and company-specific planning for IT security questions and to make them a step-by-step reality as a roadmap.

book comcrypto

Technology

Solutions developed by comcrypto meet the highest requirements. See for yourself.

Unique Selling Points

End-to-end encryption with multi-endpoint support

encurity encrypts all confidential data (subject, body of text and all attachments of confidential e-mails) between a sender and any number of recipients. With automatic key management and high-performance cryptographic components, these complex processes run in the background of the application without your noticing it.

Message-level cryptographic continuity (Perfect Forward Secrecy)

For each individual e-mail dispatch, unique key material is generated on the end devices, which can not be deduced from existing ones, in order to protect the confidential data. This solves the problem of key aging and drastically increases the security level of the entire communication process.

End-to-end authenticity with No-Trust-Anchor architecture

encurity automatically and uniquely validates the ownership of key material and messages without relying on third-party certificates. This creates a "digital four-eye conversation". This closes the biggest security gap of digital communication and allows only the communication partners access to the decrypted message. Even comcrypto has no way to decipher these messages.

Algorithms

We use only current algorithms based on geopolitical factors and the technical guideline of the Federal Office for Information Security (BSI). Furthermore, we adhere to the specifications of Daniel J.Bernstein and Tanja Lange, who conduct outstanding research in the field of elliptic curves.

About comcrypto

IT security software from Germany:

“Making the Difference”, making optimum security user-friendly and cost-effective - we work for you on a daily basis.

We are an efficient team of mathematicians and computer scientists who put the practicality of our solution in everyday business at the center of our developments. We invest 10% of our resources in the evolution of our cryptography stack. More than half of our team works on our standard products MXG and encurity, which represent our identity despite many international customer projects.

We started out with two people and are now 15, constantly growing. All people at comcrypto have graduates in Mathematics, IT or Engineering – framing one of the most powerful privacy teams in europe.

Contact persons:

  • Productmanagment: Georg Nestmann
  • Architecture of software: Hendrik Nöll
  • Business development: Ronald Scholz
  • Marketing and sales: Alexander Woeschka