Your Data - Your Control Regain control of your enterprise data by managed
encryption and endpoint unlocking.
Passwordless & Phishing-resistant
Multi-Factor and Network Authentication
Explore more   

Unlock Anywhere® Cloud Service

Evaluate 45 days

Free Online Support

Developed in the EU

ISO 27001 Compliant

Unlock Anywhere® Cloud Service

Evaluate 45 days
Free Online Support
Developed in the EU
ISO 27001 Compliant

Sensitive Data During Mobile Use

Service technicians, developers, consultants, managers, and many others process sensitive information on mobile devices. This information is extremely valuable, so devices must be protected as effectively as possible.

Controlling Virtual Teams

More companies are managing international virtual teams that work exclusively from home. Especially when these employees resign or their employment relationship is terminated, access to locally stored information must be prevented.

Enhance Industrial PCs with MFA

Modern compliance requirements like NIST SP 800-63B AAL2 or AAL3 and the European NIS-2 require Multi-Factor-Authentication (MFA) for users and devices. Especially industrial PCs and devices in production environments require a device centric security approach.

Due Diligence Obligations, NIS-2, 27001

In addition to data protection under the GDPR, there are a number of contractual and legal compliance requirements that require special due diligence for company data. Multi-factor authentication and encryption help with ISO 27001, NIS2, and, of course, the EU GDPR.

Strong Authentication & Encryption Compliance
for Workstations and Desktop PCs
Simple in daily use…
   High-speed access of large data
   Always encrypted – always protected
   Multi-Factor for NIS2 production PCs
High Secure Notebook Protection
Remote Work – Abroad – against 3rd Parties
Most important..
   Multi-Factor Authentication (MFA) by cloud key
   Lifetime encryption enforcement
   Remote lock - remote wipe
Devices that Easily Get Lost…
Windows Tables, Touchscreen Devices, Pads
Focus on
   Convenient MFA without Hardware or OTP
   All information secured if lost
   Tampering protection by encryption
Industrial PCs, Workstations in Production...
equipped with most valuable data & highly exposed
NIS-2 Compliance enforced:
   Always Encrypted
   Automatic reboot despite MFA authentication
   Secure disposal after remote lock
Secure Workstation / Desktop
0K+ Users
0 Years in Market
0 Available Languages
0 Partners Worldwide

… Our Experience

Go Passwordless! Multi-Factor Authentication
for Windows Devices
Unlock Anywhere® secures Windows devices with multi-factor protection via central cryptographic keys and convenient user authentication. done_all Multi-factor does not require smartphones
     or additional hardware
  End device protection through encryption
Device start controlled by the company
Compliance with ISO 27001 or NIS-2
play_circle_outline Company
Authentication
User
Authentication
[ ****** ] Unlock Anywhere®
Cloud Service
by Windows Hello

Notebook Lost

Afraid of loosing a notebook with sensitive data? Regardless if it is lost or stolen, you data may be highly valuable for 3rd parties!

Unlock Anywhere®protects

Notebooks with sensitive data can be fully locked remotly once lost. The cryptographic start key can be retained in case of an incident.

Untrusted User

What happens when you lose trust in an user? The user is unwilling to return equipment or claim it is lost...

Unlock Anywhere® bans access

IT Helpdesk can lock out untrusted users from booting the PC fully eliminating data access, even to locat stored information.

Travel to unsafe country

You need to safeguard data when crossing borders or traveling with IT equipment to far destinations?

Unlock Anywhere® while traveling

The cryptographic start key for boot the end user device can be temporary suspended when traveling or crossing borders, to prevent access by untrustful authorities. Once you reach your final destination, simply unlock the start key and boot normally.

How Regulated Sectors benefit from Unlock Anywhere®

Chemical & Pharmaceutical Sector

Enterprises in the pharmaceutical and chemical sectors are subject to strict regulations regarding information security. Their supply chains often require regular IT audits and documented proof that customer data is securely managed. Larger organisations fall under the scope of the EU’s NIS2 Directive.

Consulting and Construction Sector

Consulting firms that handle sensitive customer data are required to adhere to stringent information security and compliance standards. Many clients mandate regular IT audits and formal evidence that confidential data is protected in accordance with frameworks such as ISO/IEC 27001.

Energy Sector

Enterprises in the energy sector are classified as operators of essential services and are therefore subject to some of the most stringent information security and compliance requirements. Protecting sensitive operational data is vital, as cyber incidents can directly impact energy supply and national security. Energy companies must ensuring continuous risk assessment,  and protection of both IT and operational technology (OT) environments.

ICT Sector

For ICT companies, cryptography and strong authentication are fundamental to ensuring data security, regulatory compliance, and customer trust. Cryptography protects the confidentiality and integrity of information. Strong authentication, such as multi-factor authentication (MFA) safeguards systems from unauthorized access. These measures are essential for compliance with standards such as ISO 27001, DORA and the EU NIS2 Directive.

Government Sector

Governments hold enormous databases of Personally Identifiable Information (PII) for citizen, therfore encryption and Multi-Factor Authentication (MFA) are critical for the Government Sector due to the highly sensitive and classified nature of the data they handle, and the regulatory need to protect citizen information.

Health Sector

The healthcare sector is a prime target for cybercriminals due to the immense value of Electronic Protected Health Information (ePHI), which includes medical histories, insurance data, social security numbers, and financial information.

Frequent Asked Technical Questions

Unlock Anywhere® enables passwordless, phishing-resistant authentication for Windows endpoint devices. Once configured, domain administrators can randomize user passwords and enforce passwordless Multi-Factor Authentication (MFA) exclusively. To fully eliminate passwords during Windows logon, we recommend using biometric options such as fingerprint or facial recognition through Windows Hello.

The unique value of Unlock Anywhere® lies in its cloud-based boot key, which enables secure network authentication. When a Windows PC starts, it cryptographically requests its boot key from the Unlock Anywhere Cloud Service. Upon central authorization, the boot key unlocks BitLocker encryption, allowing the system to boot securely.

What if the PC is offline? No problem, users can scan a QR code displayed on the client screen with their smartphone to retrieve a one-time boot code for secure offline access.

Unlock Anywhere® seamlessly integrates with Microsoft BitLocker, acting as a secure BitLocker protector that uses a network-based boot key to automatically start Windows devices. In the event of suspicious activity, potential threats, or a lost or stolen device, organizations can instantly block the boot key, preventing unauthorized access and ensuring complete control over endpoint security.

Please note that a Windows Professional or higher license and TPM 2.0 is required to use Unlock Anywhere®. A Microsoft 365 subscription is not required.

During installation of the Unlock Anywhere® Client Agent the BitLocker recovery key a stored in the Unlock Anywhere® Cloud Service. Once available IT helpdesk can use the BitLocker recovery key for client support or client disk recovery.

Unlock Anywhere® leverages the PC’s built-in TPM (Trusted Platform Module) for advanced cryptographic protection. If an attacker attempts to tamper with the boot key or launch a brute-force attack, the TPM’s anti-hammering technology automatically delays repeated attempts, making such attacks virtually impossible.

For maximum security and reliability, Unlock Anywhere® requires TPM 2.0 or a compatible module on all endpoint devices.

During installation, the Unlock Anywhere® Client Agent securely stores each device’s BitLocker recovery key in the Unlock Anywhere® Cloud Service. This ensures IT helpdesk teams can quickly access recovery keys when needed — simplifying client support, disk recovery, and overall endpoint management while maintaining complete security and compliance.

When an endpoint device connects to the internet, it securely requests its boot key from the Unlock Anywhere® Cloud Service. This cryptographically protected key — less than 2 KB in size — serves as the first factor of Multi-Factor Authentication (MFA), unlocking Windows BitLocker encryption. The subsequent Windows user authentication completes the MFA process, delivering a seamless yet highly secure login experience.

In the rare event a Windows endpoint is offline — without LAN or wireless connectivity — the device cannot automatically retrieve its boot key. In this case, the PC displays a QR code, which the user can scan with a smartphone to securely connect to the Unlock Anywhere® Cloud Service. The cloud service then generates a unique 8-digit One-Time Boot Code (OTP) for that specific device.
By entering the OTP, the user can safely start the Windows PC and unlock BitLocker encryption, ensuring secure access even without an internet connection.

The Unlock Anywhere® Cloud Console gives enterprises a complete, real-time overview of all encrypted and MFA-protected endpoint devices. In the event of a security incident, administrators can instantly block devices from booting, maintaining full control and visibility. A detailed audit trail of every Windows startup ensures transparent accountability across the organization.

The integrated Compliance Dashboard simplifies encryption and authentication reporting, helping organizations meet key regulatory standards such as GDPR, ISO 27001, and NIS-2.

Delivery items and prices

Pricing & Licensing

  • Unlock Anywhere is licensed per protected Windows client
  • The per client price is US$ 2.99 net
  • Subscription is for a minimum of 10 clients
  • Pay per use with quaterly or yearly settlement
  • No extra charge for support, updates, cloud management service

Volume licensing is available for 50+ clients.

What You Get

  • A tenant in Unlock Anywhere® Cloud Service
  • Software for your Windows clients

  • Free support & updates

Evaluate up to 5 Clients for 45 Days

Evaluate up to 5 Clients for 45 Days

Get in Contact Now!