A key length of 128 bits is sufficient in most cases, except where rules and regulations or personal preference stipulate a higher level. AxCrypt Premium offers 256-bit encryption which is the strongest standardized encryption available, and is used for secret and top secret information all over the world.
Easy to work with
Keeping your files secured should not be difficult and AxCrypt makes it easier than ever to do so. Open, edit and share a secured file directly with double-click.
Cloud storage awareness
AxCrypt will automatically find what Cloud Storage services are installed on your computer and create an AxCrypt folder there. We make it easy for you to automatically view and keep the files secured on these folders.
Sharing a secured file is made directly from the AxCrypt software by choosing the secured file, click the share button and simply select the team member you want to share it to. The recipient just needs a free AxCrypt ID and will be automatically invited via email if necessary. The invitation email contains instructions on how to view and edit the file.
AxCrypt secures files, individually. However, you can designate folders as ‘secured’. The folders will be monitored for new files, and AxCrypt will secure all new files with a single click, or when you sign out.
You can also select multiple files, including all files in a folder, to be secured in a single operation. They still remain individual files, and the folder itself is not secured, just the files in it.
AxCrypt speaks English, Dutch, French, German, Italian, Korean, Portuguese, Spanish, Swedish, Turkish, Russian and more to come.
|Easy installation and use||No options and simple user interface, with Windows Explorer integration.|
|Fast download and uploads||Intelligent optional compression.|
|Convenient to use||Passwords are remembered in a session.|
|Windows compatible||Windows Vista/2008/7/8/10 32- and 64-bit compatible.|
|MacOS compatible||OS X 10.8 Mountain Lion or later.|
|Mobile App||Android 4.0.3 or later, iOS 8.0 or later.|
|Standards based cryptography||Only uses well-researched cryptographic algorithms and modes of operation.|
|Data integrity verification||Secured files cannot be modified without detection.|
|Automatic File Updating||Automatic update of the secured file after open and save.|
|Local device security||Shredding of all temporary and encrypted plaintext files.|
|Large file support||Support for files larger than 4GB.|
|Metadata retention||Retains original file name and information of a secured file.|
|File Wipe||Safe removal of files.|
|Brute force resistant||Dynamic brute force counter measure – iterative password wrapping making attacks even harder.|
|Scripting enabled||Extensive command-line interface for scripting and programming.|
|Open source||Open source under GNU General Public License.|
|Support||User support via e-mail, forum and second level support via chat.|