BestCrypt Container Encryption provides painless encryption to store any selected files or folders on:
Encrypted containers work like virtual drives – intuitively easy with transparent use and access to files. File encryption by Jetico delivers cross-platform compatibility: BestCrypt container files may be moved to any computer or storage media, working seamlessly between Windows, Mac OS and Linux.
Prevent unintended data leaks
BestCrypt Container Encryption protects any selected files or folders from leaking out. Nobody can get access to your private data unless they have the right password or keys.
Encrypt files and folders easily and transparently
Thanks to access via virtual drives, BestCrypt Container Encryption is really easy to use. Once the password is verified, you can transparently access and use the data for any application - just the way you are used to working. No further actions are needed to keep new or altered files in a secure encrypted state.
Available on all major platforms: Windows, Mac OS and Linux
BestCrypt Container Encryption supports all major operating systems – Windows, Mac OS and Linux – with the same level of advanced data protection to ensure that all your confidential data is accessible across all major platforms.
Gain peace of mind with strong encryption algorithms
BestCrypt Container Encryption utilizes a robust variety of strong encryption algorithms: AES, Blowfish, Twofish, CAST and others. Each algorithm is implemented with the largest possible key size defined in the algorithm's specification. In addition to CBC and LRW encryption modes, BestCrypt utilizes the most secure XTS encryption mode.
Military-grade file wiping with BCWipe included
For data no longer needed, BestCrypt Container Encryption includes the full version of BCWipe. For over 10 years, BCWipe has been trusted as the de-facto standard for the U.S. Department of Defense, all of the top 10 U.S. Defense Contractors and many National Laboratories. Despite its industrial strength, BCWipe is still easy to use.
Store and Access Encrypted Files Easily via Virtual Drives
Encrypted virtual drives are visible as regular disks. Encryption/decryption is totally transparent for applications.
Create and Manage Multiple Containers
Number of containers is not limited. Size of container is limited by the partition size.
Mount Encrypted Drive as a Subfolder
In addition to usual drive letters, BestCrypt can mount encrypted drives as a subfolder of NTFS folder. So you are not limited by the number of free drive letters.
Define Usage in Multi-user Environment
BestCrypt containers can be mounted for the current user only, or for all users. Containers mounted for all users can be shared in the network for a group of users. BestCrypt can work in Terminal Service environment. BestCrypt remembers shared information, so that administrator does not need to share the folders again after each mounting.
Create and Access Containers Instantly
With BestCrypt users can start adding files immediately with instant access to encrypted containers. The BestCrypt container will finish encrypting in the background while users work with their sensitive information.
Work with Dynamic Containers
Dynamic Containers allow your encrypted storage to expand as you go - maximum size is set at time of container creation, while actual container size grows as files are added. For optimized stability and to prevent system crashes and data loss, Dynamic Containers feature Smart Free Space Monitoring technology. Jetico's unique innovation monitors system parameters and constantly indicates the amount of data that can be written to Dynamic Containers.
Move and Store Encrypted Containers across Windows, Linux and Mac Operating Systems
Enhanced Hidden Containers
BestCrypt supports one or more hidden containers inside outer container. It is impossible to define whether a shell container is concealing a hidden container or not.
Operations with Container Headers
Container's header can be (optionally) encrypted. It can be backed up and stored separately as a small file. The original header inside container can be wiped, that allows preventing password-guessing attack.
This low-level module, once it is turned on, works in the background when the user enters password in BestCrypt password box. Keyboard Filter prevents keyboard monitor utilities (keyloggers) from intercepting a real password that the user types
Support for Public Key Encryption
The software supports key pairs in standard formats PKCS #12, X.509 and PGP keys. Encrypt container with public key of other person to allow him/her to access data inside the container.
Support for Secret Sharing Schemes
This functionality allows a group of persons to share a single encrypted container so that only selected members of the group will be able to open the container.
This software is not reviewed yet.
Permanently delete data and wipe free space with BCWipe. BCWipe is trusted throughout the U.S. DoD to securely erase files and folder beyond recovery - including free space, file slack space and MFT records. Available for Windows, Mac and UNIX.
Before selling, disposing or donating used computers, securely erase hard drives with BCWipe Total WipeOut. Trusted as the de-facto standard for the U.S. DoD, BCWipe Total WipeOut erases boot records, filesystem structures and operating system files.
BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks.