top of page

Acerca de

Frequently Asked Questions 
What is Inperson365?

Inperson365 provides end-to-end encryption to ensure that your data is protected throughout its journey. This means that your data is encrypted and can only be decrypted by the intended recipient, preventing unauthorized access. 

In addition to encryption, Inperson365 also offers authentication and authorization mechanisms. This ensures that only authorized users or systems can access and interact with the data. This helps to prevent malicious attacks and unauthorized users from gaining access to sensitive information. 

Furthermore, Inperson365 is designed to be scalable and adaptable to meet the evolving needs of enterprises. Whether it's facilitating communication between machines, applications, or individuals, Inperson365 provides a secure and reliable platform. 

Overall, Inperson365 prioritizes the security of your data throughout its entire journey, offering advanced encryption, authentication, and threat detection measures. With its innovative features and comprehensive security capabilities, Inperson365 is a trusted solution for secure digital transfer.

What is Inperson365?
General Questions
Genral Questions
I received a secure email from Inperson365. What to do? - Is this even legitimate?

Thank you for informing me about the Inperson365 transfer notification. I understand that the sender has recognized the need for a secure and confidential transfer of data, which is a cause for celebration. 


To access the transmitted data, I will open the notification email again and click on "Download Files" to launch the Inperson365 web application. I am aware that a password is required to retrieve the data, and I will contact the sender to obtain the password if I haven't received it via SMS. The sender's name and phone number can be found in the left upper corner of the Inperson365 notification email. 


Once I enter the password, I will be able to access the download page and preview or download all files and messages. I appreciate that Inperson365 scans all contents for viruses and malware, ensuring a secure transfer. 


Furthermore, I note that I can use the "Reply" link in the upper right corner of the Inperson365 notification email to send confidential data or large files back to the sender. This eliminates the need for insecure transfer methods with this communication partner.

How much does Inperson365 cost?

What level of customer support do you require? 

Do you need additional storage or data transfer? 


Are there any specific customization or integration requirements? 


What is the duration of your subscription plan? 


Are there any additional features or add-ons that you would like to include? 


Is there a need for training or onboarding services for your employees? 


These factors will determine the final price of Inperson365. Please provide more details for a more accurate pricing quote.

How is Inperson365 different than other transfer methods?

We are proud to present Inperson365 as a highly secure and user-friendly method for transferring large or sensitive information. In comparison to other options such as Email, S/MIME, FTP, S-FTP, or portal solutions, Inperson365 stands out for its intuitive and user-friendly interface, without compromising on security. 


One of the key advantages of Inperson365 is that it does not require any client software installation; a simple browser is all that is needed. This eliminates the hassle of installing additional programs and ensures easy access for users. Furthermore, the system is designed to be self-explanatory, requiring no special know-how. Its attractive and intuitive user interface can also be customized to align with your corporate design, making it even more user-friendly. 


Another notable feature of Inperson365 is the absence of user accounts. This eliminates the need for remembering passwords or dealing with time-sensitive account creation requests. Additionally, Inperson365 provides a full audit trail of all transfers, ensuring transparency and accountability. Users will be kept informed of the status of their transfers, and a central log will provide comprehensive information about all transfers. 


In terms of data management, Inperson365 ensures that no files are left behind. It automatically deletes transfer packages after a configurable number of days, effectively cleaning up after itself. This helps maintain data privacy and security. 


To further enhance ease of use, Inperson365 can be seamlessly integrated into Outlook and Notes, allowing for a more streamlined experience. Additionally, Inperson365 has no file size limits, enabling the exchange of files of any size. 


For ad-hoc file transfers in B2B or B2C communication, Inperson365 is an ideal solution. It excels in facilitating secure and confidential data transfer, even from external parties, without the need to fulfill any prerequisites. 


In conclusion, Inperson365 strikes the perfect balance between high-level security and user-friendly functionality. Its intuitive interface, lack of client software installation, and seamless integration options make it an exceptional choice for transferring large or sensitive information.

How is Inperson365 different than other products and providers of services for web-based secure file transfer?

Inperson365 is characterized by the following advantages:

Inperson365, a robust file exchange solution, is fully within your control. It operates from our secure data center or can be hosted as a private cloud service, providing the utmost security for your company's file-sharing needs. Unlike public cloud-based platforms, Inperson365 is a business server product that ensures seamless accessibility for both senders and recipients. By granting them access to the Inperson365 server URL, they can bypass any firewall or filter systems that may impede their access to the system. 


Rest assured that your data remains confidential, with only you having the ability to access and read it. Unlike many cloud services, Inperson365 does not feature a backdoor for lawful interception, further safeguarding the privacy of your information. 


One of the standout features of Inperson365 is its consistent encryption, which eliminates the need for exchanging certificates or software in advance. This streamlines the process and enhances efficiency, allowing for seamless file sharing. 


Additionally, Inperson365 eliminates the need for user accounts, sparing you the hassle of time-sensitive account creation, password resets, and account deletions. This streamlined approach saves valuable time and resources. 


Another significant advantage of Inperson365 is its cost-effectiveness. External users can utilize the platform without incurring any expenses, regardless of whether they send or receive files. There are also no limits or costs associated with transfer volumes or bandwidth, apart from the charges imposed by your internet service provider. Furthermore, storage costs in Inperson365 are minimal, as they are dependent on the physical storage allocation you designate. 


In conclusion, Inperson365 offers a reliable and secure file exchange solution, granting you full control over your data. With its user-friendly interface, consistent encryption, and cost-effective features, it is a trusted choice for businesses seeking a comprehensive file sharing solution.

How is Inperson365 for Outlook different from S/MIME or PGP?

Easier to use


Our secure messaging platform offers a user-friendly experience, making it easier for you to send encrypted messages. Unlike other methods that require prior setup or the exchange of public keys, our system allows you to send secure messages on the fly, without any preparation. Even recipients who do not have S/MIME, PGP, or an in-person365 installation can receive your messages effortlessly. All they need is an email address. To ensure the security of your communication, you will need to inform the recipient separately about the password you have set for the message. If you forget to provide the password, our system will automatically share your contact details with the recipient, enabling them to reach out to you. With our streamlined and hassle-free approach, you can communicate securely and conveniently.


No size limit

While S/MIME and PGP encryption provide secure communication for your email messages, they do not facilitate the transfer of large files. This limitation often arises due to size restrictions imposed by mail servers, recipient's mail servers, or email providers along the way, with limits as low as 10 or 20 MB. With Inperson365 for Outlook, you have the flexibility to send and receive large files seamlessly, without worrying about size restrictions. The only limiting factor would be the configuration set by your system administrator, providing you with full control over the size limitations.


More security

S/MIME and PGP can encrypt the email body text, but not the subject line. Inperson365 for Outlook can encrypt the subject line if it contains confidential information. This helps protect you and your recipient from eavesdropping and social engineering attacks. S/MIME and PGP use the same encryption keys every time you communicate. If the private key gets compromised, so does any communication you have encrypted with the corresponding key pair. Inperson365 uses another key for each communication between two parties.


More compliance and audit trail


Additionally, Inperson365 ensures that your message remains confidential and secure throughout the entire communication process. By utilizing the latest transport and storage encryption technology, your message is protected from unauthorized access and ensures that only the intended recipient can access and download the message. 

Furthermore, Inperson365 eliminates the need for your message to pass through multiple mail servers, some of which may be beyond your control. This reduces the risk of your message being intercepted, tampered with, or lost during transmission. 


By uploading your message to your secure server, Inperson365 provides a centralized location for all communication activities. This allows for a comprehensive audit trail, tracking the delivery and receipt of messages, as well as any attempts to compromise the contents of the communication. 


In terms of compliance with data protection legislation, Inperson365 alleviates the concerns and complexities associated with different countries and industries. By maintaining control over the server and encryption technologies, you can ensure that your communications meet the requirements and standards.

Does Inperson365 for Outlook work with Office 365?

Inperson365 for Outlook can be used with any supported version of a local Outlook installation on your PC, no matter how Outlook has been licensed or purchased. This includes all Office365 plans where you can download and install Outlook on your computer. However, Inperson365for Outlook is not yet available within the Outlook Web App (OWA).

Where can I download the installers of Inperson365 server, Inperson365 for Office 365 & Outlook and Inperson365 for Notes?

Since we as a manufacturer of security technology are subject to certain regulations, we cannot make the files completely publicly accessible.

However, you can open a user account in our customer and partner area at any time and download the files afterwards.

Can the domain names registered in the license key be changed later on?

Yes. The registered domain names can be changed at any time. To have them changed, please get in touch with your reseller. You will then get a modified license key. We charge a handling fee for all changes to the licence key.

Do external communication partners need an extra license?

No. External communications partner that communicate with you using your company's Inperson365 Server do not need to be licensed. Neither if you send information to them nor when they send information to you. Also, they don't need to create a user account or set up any software.

I have purchased a named user licence and would like to change the listed names. Is that possible?


Can the number of licensed domains be increased later on?

Yes, you can add more domains to your license key as long as these domains are owned by your company as well.
Please get in touch with your reseller. You will then get a modified license key. We charge a handling fee for all changes to the licence key. If you add more users by adding more domains, you might have to increase your license.

Is Cryptshare for Outlook included in our license?

The use of Inperson365 for Outlook requires an Business Licence Key to be installed on the Inperson365 Server. As a user, you cannot check whether or not Inperson365 for Outlook is licensed on your Inperson365 Server. However, your administrator can check the licence key as described in our admin documentation.

I have purchased a named user licence and would like to change the listed names. Will there be a charge for this?

We reserve the right to charge for repeated requests of listed name changes.

Technology and Architecture
Technology and Architecture
Which encryption technology is used by Inperson365?

Inperson365 uses latest transport layer security (TLS) to protect the communication between clients and servers. The key length is depending on the SSL certificate you implement on your Inperson365 Server.


Files that are stored on the Inperson365 server are also encrypted. We use the AES algorithm with a key length of 256 bit. Each transfer is encrypted with an individual AES key. Inperson365 Server does not save passwords at any time.


The Inperson365 add-on products "Inperson365  for Outlook” and “Inperson365 for Notes” also use TLS for communication with the Inperson365 Server.

Where is the Inperson365 Server located? Is it hosted or is it in the cloud?

When you decide to use Inperson365, you will have one (or many) Inperson365 Servers dedicated for your business. Employees of your business can use them to exchange their own files with their external communication partners. No third parties can use your Inperson365 Server(s) to communicate with each other.


You can run your own Inperson365 server(s) within your secure perimeter (e.g. within your DMZ). Or you can decide to have your Inperson365 Server(s) hosted by a hosting partner or Infrastructure-as-a-Service cloud provider of your choice.


In the meantime, Inperson365  is also available as a public cloud-based Sofware-as-a-Service.

Do I open a security leak by using Inperson365 in my company?

No. Inperson365 provides a series of security measures (e.g. SSL/TLS for transport security, AES 256bit for storage security, policy control, detailed logging, one-time passwords etc.). In addition, that, you can use third-party systems to further control the data streams such as Anti-Virus solutions or DLP solutions to scan the contents that are sent or received and block unwanted information from leaving or entering the business. Thus, Inperson365 provides compliance.


As Inperson365 fulfills all the communication needs of your users, is very easy to handle and provides control for your users, they will no longer go for shadow IT solutions to exchange large files.


So Inperson365 closes existing security holes by bringing your users on-board a well-controlled, auditable and secure communication solution with a maximum level of interoperability between you and your customers and partners.

How large can a file transferred via Inperson365 be at maximum?

A file or a transfer package consisting of multiple files can have any size. There is no technical limit in Inperson365 other than limitations of the server hardware for storing the file.


Although there is no technical limit for the size of files transferred via Inperson365, we suggest to set a size limit which reflects the performance limits of your current IT infrastructure.


The size limit for Inperson365 transfer is not static. Using the Inperson365 policy, you can set individual size limits for certain sender/recipient combinations and tailor Inperson365 to meet different use cases of different user groups in your business.

Is it possible to run multiple Inperson365 Servers in my company?

Yes. You can run as many Inperson365 servers as you want without any additional license cost as the license is per mailbox, not per server. This way, you can set up for example an Inperson365 Server for each country or continent your company is represented in.

Can logging information of a Inperson365 server be imported into a log management system?

Yes. The log data are stored in a database on the Cryptshare Server. It is possible to export the log data into central log management / SIEM systems for further processing using the LogBack library.

Why is Inperson365 for Outlook secure?

Inperson365 for Outlook

  • Secures the transport of your data between your computer and the Inperson365 Server as well as between the Inperson365 Server and the recipient's computer using the latest transport layer security (TLS) standards.

  • Secures the files using strong AES-256bit encryption while they reside on the Inperson365 Server using one-time encryption keys for each transfer which are not stored on the server, but can only be generated by you or the recipient in terms of entering the correct transfer password.

  • Automatically removes data from the server after a defined interval.

  • Performs a virus check of all contents you send or receive via Inperson365.

  • Detects unauthorized attempts to download data and reacts by blocking or deleting the contents from the server and informing you about the incident.

  • Keeps a full audit trail of the data you send and receive, including IP addresses of senders and recipients.

  • Notifies you about successful and unsuccessful delivery.

  • Puts you in control over your data at any time.

Can file exchange take place in both directions, i.e. outbound and inbound?

Yes. You can exchange files in both directions. Neither your employees nor their communication partners need to install software, exchange certificates, or set up user accounts in advance. No matter if the transfer is inbound or outbound – the sender opens the URL of the Inperson365 server in his browser and is guided through a few easy, self-explanatory steps.


Thus, anybody can send messages or files securely without having to involve IT staff in advance.


The Inperson365 license covers communication with any number of external contacts, no matter if these use the system as recipients or senders.


To make Inperson365 even easier and more comfortable to use, we offer integration into MS Outlook and IBM Notes. These allow the confidential sending and receiving of confidential messages or large files straight from your email client.

Can I use Inperson365 to exchange files with any number of communication partners?

Yes. You only need to license the number of email accounts within your own email domain(s). The number of external contacts you communicate with is not relevant for the license price.

It does not matter for the license if the external users are sending or receiving information.

Is there a log where I can see which files have been provided and downloaded when and by whom?

Yes. The sender of a transfer gets an email that informs about the download of a file transfer. Also, he is notified if the download expires without having been downloaded. In addition to that, there is a central log file that only administrative users can access. You can configure logging options to keep track of the details you want to see and hide those you don’t want to log.


It is possible to log the point in time when up- or downloads have been made, the sender and recipients’ IP and email addresses, filenames and sizes as well as texts and subjects entered by the users.

What is the maximum file size I can send?

Technically, there is no size limit in Inperson365, so you could potentially send files of any size. However, there are limits that the administrator can (and probably will) set. These limits do not apply per user, but per sender/recipient combination, so they could be different when sending to recipient A or B. This will allow the administrator to tailor the file size to the use case. For example, you might be able to send very large files to somebody in the marketing department that deals with hi-resolution images and videos, but will see a lower limit when sending to HR.


Even though you can send very large files out of MS Outlook now, you don't need to worry about the size of your mailbox. There are warning thresholds and file size limits that allow customizing the solution so that only files up to a certain size can be kept as email attachments in inbound or outbound messages. Larger files can only be saved to disk.

Is there a possibility to control access to Cryptshare by creating user groups?

The Inperson365 policy allows controlling access to Inperson365 by black- or whitelisting using regular expressions against email addresses, email domains, LDAP users, LDAP groups, IP addresses, and IP address ranges. Thus you can control on any desired level of granularity who can use the system and who cannot. Actually, you do not only grant access to certain users or groups, you can even control whom they can communicate with and whom they can not.

We currently support Microsoft Active Directory and IBM Domino Directory as LDAP directories.

Can the retention period of the files be varied?

Yes. Administrators can set a maximum retention period for transfers. For each transfer, the user can modify the retention period to a value within the limits set by the administrator.


The retention time limits set by the administrator can be defined in policy rules. This means that you can set different maximum retention times for different sender/recipient combinations. For more details, please refer to our documentation on Policy Settings.

Is there a possibility to apply a content filter on the files that are being transferred via Cryptshare?

Yes. Using third-party content filters / reverse proxy servers that are able to scan SSL/TLS traffic on port 443, the data stream from/to the Inperson365 server can be monitored by this filter as well.

Is Inperson365 GDPR/DSGVO/AVG, NTA7516, CCPA, FIPS140-2, HIPAA etc. compliant?

Inperson365 has strong encryption and will help you to be compliant with standards like GDPR/DSGVO/AVG, NTA7516, HIPAA, or CCPA.


Our development approach is to continuously develop and improve our product Inperson365.
Customers benefit from this model because they are always entitled to the latest and best version of Inperson365.


Certification of a product with the scope of Inperson365 would take several months to complete and would only apply to exactly the version that has been certified.


Any changes to that version would require a re-certification of parts or even of the complete solution, causing similar effort.


As Inperson365 is a web application, we provide minor fixes and updates on a regular basis. This is done to react to recent security threats becoming known in technology components that we use as well as to react to new developments like updated browser versions or technologies. Unfortunately, this frequent update policy is contradictory to a certification approach. Apart from the implications on our release cycles, the cost for a continuous recertification cycle would demand us to increase license costs significantly.


As a result, Inperson365 is currently not certified at any level of the Common Criteria.


We have customers in many security-relevant industries such as banking, insurance, public sector, utilities, defense, etc. who are using Inperson365 after having assessed product security on their own. In addition to internal automated and manual security reviews, we also encourage all our customers to share feedback from security checks and assessments with us to constantly keep product security on a high level.


We do not regard security as a one-time achievement but as a constant process.

How do I install Inperson365? Can I install Inperson365 on my own?

We provide Inperson365 as a pre-configured Virtual Appliance or Hardware Appliance that you can take live in no time.
Alternatively, Inperson365 can be installed very easily on any supported operating system using automated installation routines.


For our email integration products, several methods for automatic large-scale roll-outs exist.

Do I need an SSL certificate and if so which one?

Yes. You do need an SSL certificate to allow encrypted transfer between the users and the Inperson365 Server. The certificate is not part of the Inperson365 license and needs to be obtained separately by you. There is a self-created certificate pre-installed on the Inperson365 Server when it is shipped to you. However, this certificate is only provided to secure your access to the system during the first-time configuration and should be replaced by a commercial certificate as soon as possible.


There are no specific requirements for the SSL certificate. Technically you can take any certificate from any provider.


We suggest taking the following into consideration though:

  1. Choose a provider that issues certificates from a Certificate Authority that is known to the browsers that your users want to use. You can see the list of known Certificate Authorities in the browsers. This makes sure that visitors of your Inperson365 Server will not see any security warnings when using the site.

  2. Depending on the provider, there may be additional options you can book or buy for your SSL certificate. In terms of encryption, no additional options are required to use Inperson365. The simplest SSL certificate will do. However, you can use any additional options without any problems as well if you wish.

  3. SSL certificates not only provide encryption but also provide authenticity. You might want to go for additional certificate options (e.g. EV - Extended Validation) to increase the trust of your users in the authenticity of your certificate.


Please note: you need a separate SSL certificate for each (sub-)domain you want to use. So if you want to use an additional website or web application on the same machine, you need multiple SSL certificates or a so-called wildcard certificate that covers all possible subdomains of the main domain.

What are the prerequisites for operating Inperson365?

The resource requirements are very much depending on the usage profile of your Inperson365 Server. Are you going to exchange few, but very large files? Or will you send thousands of small, secure emails every day? We are happy to help you sizing the right machine for you. The following information is helpful to assess your ideal hardware specification:

  • Expected number of transfers per day

  • The expected average size for a transfer

  • The preferred average retention period for the transfers

  • Expected peak load (How many parallel up,- and download operations shall the system be able to handle at maximum)

Which languages are supported?

Out of the box, we provide language packs for several languages such as Dutch, English, French, German, Italian, Spanish, Swedish, and Portuguese. You can see a full list of provided language packs here.


However, Inperson for Outlook is designed so that you can create and add language packs yourself if you wish to use Inperson365 for Outlook in further languages which are important for your business.

Can I change the User Interface Design of Cryptshare for Outlook?

Currently, you can only change the design of Inperson365 protective email classification yourself. But if you would like to have customized and branded versions, please get in touch with

bottom of page