We are excited to share that we are set to begin a new chapter with Dropbox, Inc. Dropbox is acquiring our IP technology to embed natively into the Dropbox product, bringing end-to-end, zero-knowledge encryption to millions of business customers around the world. Check out our blog to find out more!

Boxcryptor Blog

Security – Cloud – Updates

Data Protection and Cloud for Business

Here you will find data protection related tips and discussions for companies, organizations, and self-employed persons.

CLOUD Act

The American CLOUD Act

With the introduction of the CLOUD Act, the U.S. government is declaring war on European data protection regulations by strongly contradicting the GDPR - encryption protects data from unauthorized access.

The EU Parliament Votes for a New Copyright Reform

Copyright Reform: Is this the end?

What consequences does the reform of the European copyright law has for the creative minds and communities online? Are we moving towards a control of the internet?

Boxcryptor at it-sa in Nuremberg

Meet us at the it-sa 2018

Meet Boxcryptor and talk to us about cloud security: Visit our booth at Europe's leading trade fair for IT security - The it-sa 2018 in Nuremberg, Germany

Das sagt das BDSG (neu) und Verschlüsselung

Federal Data Protection Act in Germany [BDSG (new)] and Encryption:

This text provides an overview on how encryption is mentioned in the BDSG (neu)

Data Protection Training for Employees

Why do employees have to be trained in data protection?

Learn more about data protection video training for employees.

Boxcryptor at CEBIT 2018

Boxcryptor at CEBIT 2018

Read about where to find us and get to know our encryption software Boxcryptor, at this years CEBIT in Hannover, Germany.

Multi Cloud

Hybrid Cloud, Multi Cloud and securely using and managing them for your company

We explain Hybrid Cloud and Multi Cloud, with their respective advantages and disadvantages. Furthermore, we would like to show how to use those models with the highest possible level of security.

Shadow IT - a problem for companies

Shadow IT: How to Prevent Unauthorized Software

Unauthorized software brings a variety of problems. Some of them can be solved with the help of encryption.