External contacts often have neither S/MIME nor PGP certificates. In addition to the portal, PDF encryption provides another alternative to securely reach recipients without key material. Nevertheless, sensitive content (patient reports, audit documents, specifications) must arrive encrypted.
Secure Communication Without Key Material
PDF containers enable secure email communication even when the recipient has no encryption keys. All content is packaged into an encrypted PDF container.
The PDF container ensures that sensitive information can be transmitted securely even without own key infrastructure.


Practical Application Cases
PDF encryption is used in various industries and situations where secure communication without own key infrastructure is required.
These use cases demonstrate the versatility of PDF encryption for various compliance requirements and industries.
Automated Processing
The technical process of PDF encryption runs fully automatically through the workflow engine and various services that work seamlessly together.
The entire process runs automatically and requires no manual intervention while meeting all compliance requirements.

| Requirement | Implementation |
|---|---|
| DSGVO Art. 32 | AES-256, password policy, audit log |
| NIS2 | Encryption when PKI is missing, incident webhook |
| ISO 19005 (PDF/A) | Long-term archiving ensured |