About Our Products:
MULTIPOINT Crypt products were developed with the consideration of increasing data transfer security requirements between users, remote sites or remote storage sites. Since ensuring stable and leak-proof communication is very expensive, the most favourable and economic solution is: transferring and storing encrypted data via a standard secured connections.



Today, your data’s security is constantly under threat. A multitude of software applications, complicated IT solutions, and dependence on assistance from external IT companies are factors which are interfering with your security. These are the reasons why the CRYPTONOX project started.

About us

Our project objective is to research and develop value-added products for protecting sensitive data. Implementing multiple security elements into a single unit is our priority. Our effort has resulted in sophisticated products with operations conditioned by constant, simultaneous presence of multiple protection elements. We are currently using several types of encryption.

Users of the CRYPTONOX product line are from individuals, groups, and business entities who:

  • require modern security solutions
  • require an individual approach
  • do not trust “mass distribution” programs
  • do not trust “shared key” type technologies


CRYPTONOX focuses on cooperation between the following technological elements:

  • Software
  • Hardware
  • Password

Software: is the program for protecting all types of files. Protecting files utilizes a strong encryption algorithm combined with a unique hardware key. Encryption and decryption requires a password which is generated and stored in the unique hardware key. The extensions of the encrypted files are not changed what providing convenience to work with secured files.

Hardware: the presents of the hardware key is needed for file encryption and decryption. The hardware device does not require any special driver installation. Each device has its own access password, which can be changed.

Password: A password must be entered to access secured files and the user may change this password at any time. This password is generated automatically based on a so-called seed code (max. 64 characters) selected by the user.