{"id":19257,"date":"2020-08-26T10:45:43","date_gmt":"2020-08-26T08:45:43","guid":{"rendered":"https:\/\/leitzcloud.eu\/encryptions-in-the-cloud\/"},"modified":"2026-03-27T14:11:59","modified_gmt":"2026-03-27T13:11:59","slug":"encryptions-in-the-cloud","status":"publish","type":"post","link":"https:\/\/leitzcloud.eu\/en\/blogs\/encryptions-in-the-cloud\/","title":{"rendered":"Encryptions in the Cloud"},"content":{"rendered":"\n<p>Privacy and security control over one&#8217;s own files and their transfers is one of the most important matters in the digitalized times in which we increasingly live. In this regard, it is now appropriate to create a comparison of various encryption programs that provide you with the necessary data security in private and professional life. <\/p>\n\n<p>First of all, it must be clarified that such software specializes in certain ways of working. Some programs specialize in encrypting files that are available online and are therefore, if necessary, meant to be readable by others, authorized persons. Other programs specialize in local encryption, which is intended to make the files readable only locally.  <\/p>\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Daten Verschl\u00fcsseln Einfach Erkl\u00e4rt - 4\/5\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/IhoG37uis3k?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n<p>So, here are the safest and most commonly used encryption programs currently available for consumers:<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-verschlusselungen-in-der-cloud\">Encryptions in the Cloud<\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"h-boxcryptor\">Boxcryptor<\/h3>\n\n<p>Boxcryptor is a German company that has become globally known for its decryption program. Since their program is already integrated with several cloud providers (including leitzcloud), the program is very user-friendly both on the computer and on mobile devices. <\/p>\n\n<p><strong>Advantages:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>High security standards in data encryption<\/li>\n\n\n\n<li>Compatible with all operating systems<\/li>\n<\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-cryptomator\">Cryptomator<\/h3>\n\n<p>Cryptomator also stands out with its excellent security standards, good prices, and user-friendliness. In addition, unlike Boxcryptor, Cryptomator is open-source. On the other hand, cloud integration is not as extensive as with Boxcryptor, which also affects the number of features, such as direct sharing via the program. Nevertheless, this program can be highly recommended.   <\/p>\n\n<p><strong>Advantages:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>User-friendly<\/li>\n\n\n\n<li>Active community<\/li>\n\n\n\n<li>Open Source<\/li>\n<\/ul>\n\n<p><strong>Disadvantages:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>Lacking fundamental features<\/li>\n\n\n\n<li>App sold separately<\/li>\n<\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-encrypto\">Encrypto<\/h3>\n\n<p>Encrypto focuses on sending and sharing encrypted files, but it also works for encrypting local data and cloud storage. Simply drag any file into the application window, set a password, and add an optional password hint that only you and the recipient would know the answer to. The file is then encrypted and can be saved on your computer and\/or sent via email, Dropbox, or even USB stick. Both the sender and the recipient must have Encrypto installed for the file exchange to work.   <\/p>\n\n<p><strong>Advantages:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>Very user-friendly<\/li>\n\n\n\n<li>Direct file exchange possible<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading\" id=\"h-verschlusselung-auf-dem-computer-selbst\">Encryption on the computer itself:<\/h2>\n\n<p>Here too, there are countless programs and providers, each with their own advantages and disadvantages. It should be noted, however, that Microsoft and Apple offer their own encryption software on their Windows and Macintosh operating systems. These simplify handling and, in the case of Microsoft, provide additional optional safeguards if you encrypt your hard drive and forget your password. The general rule is: when you encrypt your hard drive, secure it with a strong password.   <\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-veracrypt\">VeraCrypt<\/h3>\n\n<p>VeraCrypt was designed for encrypting local files. Those who want to share files and expect simple decryption functions are in the wrong place. Nevertheless, it is considered one of the best encryption programs for local hard drives, apart from Microsoft\u2019s BitLocker and Apple\u2019s FileVault.   <\/p>\n\n<p><strong>Advantages:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>Multiple algorithms available<\/li>\n\n\n\n<li>Open Source<\/li>\n\n\n\n<li>Hard drive and operating system encryption<\/li>\n<\/ul>\n\n<p><strong>Disadvantages: <\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>Not for beginners, technical affinity recommended<\/li>\n\n\n\n<li>Few support options<\/li>\n<\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-diskcryptor\">DiskCryptor<\/h3>\n\n<p>DiskCryptor is a free program for Windows that allows you to encrypt entire hard drives or partitions to protect data from unauthorized access.<\/p>\n\n<p><strong>Advantages: <\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>Custom shortcuts can be used for quick mounting and unmounting of drives<\/li>\n\n\n\n<li>Can automatically dismount the volume at logoff<\/li>\n\n\n\n<li>Supports pausing an encryption to restart the drive or transfer it to another computer<\/li>\n<\/ul>\n\n<p><strong>Disadvantages: <\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>No updates since 2014<\/li>\n\n\n\n<li>Not many help files\/documentation<\/li>\n<\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-windows-bitlocker\">Windows BitLocker<\/h3>\n\n<p>BitLocker is a security feature from Microsoft that encrypts system drives, hard drives, or removable media. Certain Windows operating systems even have BitLocker already integrated. <\/p>\n\n<p><strong>Advantages:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>The setup and configuration is relatively simple<\/li>\n\n\n\n<li>Virtually no impact on read performance and minimal impact on write performance compared to others<\/li>\n\n\n\n<li>Closed source<\/li>\n<\/ul>\n\n<p><strong>Disadvantages:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>Dual boot not possible<\/li>\n<\/ul>\n\n<p>Encryption software itself, however, is not 100% secure. Vulnerabilities are often found with the user. Passwords and their poor confidentiality often represent a security gap. In this regard, we recommend <a href=\"https:\/\/leitzcloud.eu\/passwortschutz\/\">our blog on secure passwords<\/a>.   <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Privacy and security control over one&#8217;s own files and their transfers is one of the most important matters in the digitalized times in which we increasingly live. In this regard, it is now appropriate to create a comparison of various&#8230;<\/p>\n","protected":false},"author":14,"featured_media":20765,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[72],"tags":[],"class_list":["post-19257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Encryptions in the Cloud - leitzcloud by vBoxx<\/title>\n<meta name=\"description\" content=\"Compare secure encryption programs for cloud data and protect your files privately and professionally from unauthorized access.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/leitzcloud.eu\/en\/blogs\/encryptions-in-the-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encryptions in the Cloud\" \/>\n<meta property=\"og:description\" content=\"Compare secure encryption programs for cloud data and protect your files privately and professionally from unauthorized access.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/leitzcloud.eu\/en\/blogs\/encryptions-in-the-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"leitzcloud by vBoxx\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/leitzcloudbyvboxx\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-26T08:45:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-27T13:11:59+00:00\" \/>\n<meta name=\"author\" content=\"Lea Juelicher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@leitzcloud\" \/>\n<meta name=\"twitter:site\" content=\"@leitzcloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lea Juelicher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryptions-in-the-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryptions-in-the-cloud\\\/\"},\"author\":{\"name\":\"Lea Juelicher\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#\\\/schema\\\/person\\\/e98466594c5f872672e7da855427696d\"},\"headline\":\"Encryptions in the Cloud\",\"datePublished\":\"2020-08-26T08:45:43+00:00\",\"dateModified\":\"2026-03-27T13:11:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryptions-in-the-cloud\\\/\"},\"wordCount\":663,\"publisher\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryptions-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/leitzcloud.eu\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/blog-verschluesselung-cloud.jpg\",\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryptions-in-the-cloud\\\/\",\"url\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryptions-in-the-cloud\\\/\",\"name\":\"Encryptions in the Cloud - leitzcloud by vBoxx\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryptions-in-the-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryptions-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/leitzcloud.eu\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/blog-verschluesselung-cloud.jpg\",\"datePublished\":\"2020-08-26T08:45:43+00:00\",\"dateModified\":\"2026-03-27T13:11:59+00:00\",\"description\":\"Compare secure encryption programs for cloud data and protect your files privately and professionally from unauthorized access.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryptions-in-the-cloud\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryptions-in-the-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryptions-in-the-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/leitzcloud.eu\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/blog-verschluesselung-cloud.jpg\",\"contentUrl\":\"https:\\\/\\\/leitzcloud.eu\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/blog-verschluesselung-cloud.jpg\",\"width\":2240,\"height\":1260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/encryptions-in-the-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryptions in the Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/\",\"name\":\"leitzcloud by vBoxx\",\"description\":\"Einfacher Datenaustausch und Zusammenarbeit in der Business-Cloud mit maximalem Datenschutz!\",\"publisher\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#organization\"},\"alternateName\":\"leitzcloud\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#organization\",\"name\":\"leitzcloud by vBoxx\",\"alternateName\":\"leitzcloud\",\"url\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/leitzcloud.eu\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/leitzcloudLogo.png\",\"contentUrl\":\"https:\\\/\\\/leitzcloud.eu\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/leitzcloudLogo.png\",\"width\":1499,\"height\":304,\"caption\":\"leitzcloud by vBoxx\"},\"image\":{\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/leitzcloudbyvboxx\\\/\",\"https:\\\/\\\/x.com\\\/leitzcloud\",\"https:\\\/\\\/www.instagram.com\\\/leitzcloud\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/leitzcloud\\\/\"],\"description\":\"Sichere Cloud-L\u00f6sungen f\u00fcr Ihr Unternehmen Zuverl\u00e4ssiger Schutz f\u00fcr Ihre Dateien, Kommunikation und Passw\u00f6rter \u2013 entwickelt und gehostet in Deutschland f\u00fcr maximale Datensicherheit. Entdecken Sie u.A. unsere sichere Cloudl\u00f6sung aus Deutschland.\",\"email\":\"kontakt@leitz-cloud.com\",\"telephone\":\"+49 69 8700 5778\",\"legalName\":\"LC by vBoxx GmbH\",\"foundingDate\":\"2019-10-02\",\"vatID\":\"DE326895475\",\"taxID\":\"DE326895475\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"},\"ownershipFundingInfo\":\"https:\\\/\\\/leitzcloud.eu\\\/impressum\\\/\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/#\\\/schema\\\/person\\\/e98466594c5f872672e7da855427696d\",\"name\":\"Lea Juelicher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6090e582249d9c088a67abe57b19f5dee42c235dadd9d52f2f05d8a87add36f8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6090e582249d9c088a67abe57b19f5dee42c235dadd9d52f2f05d8a87add36f8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6090e582249d9c088a67abe57b19f5dee42c235dadd9d52f2f05d8a87add36f8?s=96&d=mm&r=g\",\"caption\":\"Lea Juelicher\"},\"url\":\"https:\\\/\\\/leitzcloud.eu\\\/en\\\/blogs\\\/author\\\/l-juelicher\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encryptions in the Cloud - leitzcloud by vBoxx","description":"Compare secure encryption programs for cloud data and protect your files privately and professionally from unauthorized access.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/leitzcloud.eu\/en\/blogs\/encryptions-in-the-cloud\/","og_locale":"en_US","og_type":"article","og_title":"Encryptions in the Cloud","og_description":"Compare secure encryption programs for cloud data and protect your files privately and professionally from unauthorized access.","og_url":"https:\/\/leitzcloud.eu\/en\/blogs\/encryptions-in-the-cloud\/","og_site_name":"leitzcloud by vBoxx","article_publisher":"https:\/\/www.facebook.com\/leitzcloudbyvboxx\/","article_published_time":"2020-08-26T08:45:43+00:00","article_modified_time":"2026-03-27T13:11:59+00:00","author":"Lea Juelicher","twitter_card":"summary_large_image","twitter_creator":"@leitzcloud","twitter_site":"@leitzcloud","twitter_misc":{"Written by":"Lea Juelicher","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryptions-in-the-cloud\/#article","isPartOf":{"@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryptions-in-the-cloud\/"},"author":{"name":"Lea Juelicher","@id":"https:\/\/leitzcloud.eu\/en\/#\/schema\/person\/e98466594c5f872672e7da855427696d"},"headline":"Encryptions in the Cloud","datePublished":"2020-08-26T08:45:43+00:00","dateModified":"2026-03-27T13:11:59+00:00","mainEntityOfPage":{"@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryptions-in-the-cloud\/"},"wordCount":663,"publisher":{"@id":"https:\/\/leitzcloud.eu\/en\/#organization"},"image":{"@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryptions-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2020\/08\/blog-verschluesselung-cloud.jpg","articleSection":["Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryptions-in-the-cloud\/","url":"https:\/\/leitzcloud.eu\/en\/blogs\/encryptions-in-the-cloud\/","name":"Encryptions in the Cloud - leitzcloud by vBoxx","isPartOf":{"@id":"https:\/\/leitzcloud.eu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryptions-in-the-cloud\/#primaryimage"},"image":{"@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryptions-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2020\/08\/blog-verschluesselung-cloud.jpg","datePublished":"2020-08-26T08:45:43+00:00","dateModified":"2026-03-27T13:11:59+00:00","description":"Compare secure encryption programs for cloud data and protect your files privately and professionally from unauthorized access.","breadcrumb":{"@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryptions-in-the-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/leitzcloud.eu\/en\/blogs\/encryptions-in-the-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryptions-in-the-cloud\/#primaryimage","url":"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2020\/08\/blog-verschluesselung-cloud.jpg","contentUrl":"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2020\/08\/blog-verschluesselung-cloud.jpg","width":2240,"height":1260},{"@type":"BreadcrumbList","@id":"https:\/\/leitzcloud.eu\/en\/blogs\/encryptions-in-the-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/leitzcloud.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Encryptions in the Cloud"}]},{"@type":"WebSite","@id":"https:\/\/leitzcloud.eu\/en\/#website","url":"https:\/\/leitzcloud.eu\/en\/","name":"leitzcloud by vBoxx","description":"Einfacher Datenaustausch und Zusammenarbeit in der Business-Cloud mit maximalem Datenschutz!","publisher":{"@id":"https:\/\/leitzcloud.eu\/en\/#organization"},"alternateName":"leitzcloud","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/leitzcloud.eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/leitzcloud.eu\/en\/#organization","name":"leitzcloud by vBoxx","alternateName":"leitzcloud","url":"https:\/\/leitzcloud.eu\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/leitzcloud.eu\/en\/#\/schema\/logo\/image\/","url":"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2024\/10\/leitzcloudLogo.png","contentUrl":"https:\/\/leitzcloud.eu\/wp-content\/uploads\/2024\/10\/leitzcloudLogo.png","width":1499,"height":304,"caption":"leitzcloud by vBoxx"},"image":{"@id":"https:\/\/leitzcloud.eu\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/leitzcloudbyvboxx\/","https:\/\/x.com\/leitzcloud","https:\/\/www.instagram.com\/leitzcloud\/","https:\/\/www.linkedin.com\/company\/leitzcloud\/"],"description":"Sichere Cloud-L\u00f6sungen f\u00fcr Ihr Unternehmen Zuverl\u00e4ssiger Schutz f\u00fcr Ihre Dateien, Kommunikation und Passw\u00f6rter \u2013 entwickelt und gehostet in Deutschland f\u00fcr maximale Datensicherheit. Entdecken Sie u.A. unsere sichere Cloudl\u00f6sung aus Deutschland.","email":"kontakt@leitz-cloud.com","telephone":"+49 69 8700 5778","legalName":"LC by vBoxx GmbH","foundingDate":"2019-10-02","vatID":"DE326895475","taxID":"DE326895475","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"},"ownershipFundingInfo":"https:\/\/leitzcloud.eu\/impressum\/"},{"@type":"Person","@id":"https:\/\/leitzcloud.eu\/en\/#\/schema\/person\/e98466594c5f872672e7da855427696d","name":"Lea Juelicher","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6090e582249d9c088a67abe57b19f5dee42c235dadd9d52f2f05d8a87add36f8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6090e582249d9c088a67abe57b19f5dee42c235dadd9d52f2f05d8a87add36f8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6090e582249d9c088a67abe57b19f5dee42c235dadd9d52f2f05d8a87add36f8?s=96&d=mm&r=g","caption":"Lea Juelicher"},"url":"https:\/\/leitzcloud.eu\/en\/blogs\/author\/l-juelicher\/"}]}},"_links":{"self":[{"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/posts\/19257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/comments?post=19257"}],"version-history":[{"count":1,"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/posts\/19257\/revisions"}],"predecessor-version":[{"id":19258,"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/posts\/19257\/revisions\/19258"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/media\/20765"}],"wp:attachment":[{"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/media?parent=19257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/categories?post=19257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/leitzcloud.eu\/en\/wp-json\/wp\/v2\/tags?post=19257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}