Modern Protection:
Never lose your files to Ransomware.
Protect your business files from ransomware and other malware. We help you protect yourself from infection.
Discover our products

Security by Design
Work safely and securely with
leitzcloud by vBoxx.
A cyberattack occurs every 39 seconds – protect your data from ransomware and other threats. With leitzcloud by vBoxx, you are protected from data loss through strong encryption and
integrated ransomware protection.
Ransomware is Filtered and Blocked
An integrated security filter detects threats early, secures your files, and enables quick recovery.
Ransomware Filter
Our ransomware filter is always up-to-date. Known threats are detected and blocked.
Easy Tracking
Easily find out in the activity log when and where files were infected.
No Propagation
Infected files do not affect other folders. This prevents the further spread of malware.
File Recovery
In just a few steps, the entire organization can resume work as if nothing ever happened.

Need Help?
Please contact our Support Team to answer your questions. We are available Monday-Friday from 9 AM to 6 PM via phone, chat, and email.
Protect yourself and your team
The most important measures against Ransomware Attacks
You can take several measures to reduce the risk of infection. These features are already included in leitzcloud.
Store Backups
An important rule of thumb is to create a backup of your files. If you use our cloud solution, you already have a backup of your files online.
Block File Extensions
If you exclude certain file extensions from the cloud, none of your users can upload files with these extensions to the cloud.
Separate Workspaces
leitzcloud offers you various ways to divide users into different workspaces to quickly recover from a ransomware infection.
Restrict Access Permissions
Restricting user rights is helpful to prevent significant file changes, such as a ransomware infection.
Quick Recovery
Through file revisions, leitzcloud offers an option for quick file recovery if they are deleted or modified.
Monitor User Activities
In the activity log, you can track changes made by all users. If a user suddenly changes many file names, that is a good indicator that a cyberattack has occurred.
Ransomware Awareness
If users can recognize suspicious emails and malicious files, they can effectively help reduce the risk of infection.
Online Access
Ransomware can only access files locally to modify them. Grant your users online access only and set expiration dates for shares.