BestCrypt Volume Encryption 4.24.1.0

Advertising
Software information
Platform:
Windows 7/8/10/Vista/XP/2000/Server
Publisher:
Jetico Inc. Oy
Price:
$117
File size:
12.84 Mb
Date added:
July 21, 2019
Screenshot:
Product page:
Description from the Publisher

Your laptop gets lost at the airport or a USB stick carrying your private data get misplaced. BestCrypt Volume Encryption delivers speed, flexibility and privacy for anyone concerned with protecting sensitive information on lost computers or stolen laptops.

Jetico’s leading-edge BestCrypt Volume Encryption is an evolved class of disk encryption products that allows users to encrypt:

  • Modern volumes residing on a number of physical disk devices, such as: Spanned, Striped, Mirrored, RAID-5 volumes.
  • Windows 8 Storage Spaces.
  • Old MS-DOS style disk partitions.

Prevent unintended data leaks

BestCrypt Volume Encryption protects all data on entire hard drives from leaking out. With Pre-Boot Authentication, BestCrypt Volume Encryption is loaded before your operating system so nobody can get access to any data on your computer or drive unless they have the right password or keys.

Painless encryption: work easily and transparently

BestCrypt Volume Encryption is really easy to use - once the password is verified, you can transparently access and use the data for any application. No further actions are needed to keep new or altered data in the secure encrypted state.

Superior whole disk encryption

Compared to full disk encryption, BestCrypt Volume Encryption offers the following added benefits:

  • More flexible solution (works on RAID)
  • More user-friendly method
  • Lighter performance impact

Support for UEFI-based computers - Secure Boot included

BestCrypt Volume Encryption allows encryption of boot/system volumes on computers with operating systems loaded according to Unified Extensible Firmware Interface (UEFI).

Gain peace of mind with strong encryption algorithms

BestCrypt Volume Encryption utilizes strong encryption algorithms (AES, Serpent and Twofish). Each algorithm is implemented with the largest possible key size defined in the algorithm's specification, all avalable with the most secure XTS encryption mode.

Features

Encrypt System and Boot Volumes

Encrypts the volume from which Windows boots from, as well as the volume where Windows stores system files.

Support For UEFI-Based Computers - Secure Boot Included

Supports computers with operating systems loaded according to the Unified Extensible Firmware Interface (UEFI) between an operating system and platform firmware.

Encrypt RAID and All Types of Volumes Residing on Fixed and Removable Disks

  • Simple volume, i.e. volume consisting of one disk partition.
  • Mount point - volume mounted as a sub-folder on NTFS-formatted volume.
  • Multipartition volume, i.e. volume consisting of several disk partitions
  • Spanned volumes
  • Mirrored volumes
  • Striped volumes
  • RAID-5 volumes
  • Storage Spaces introduced in Windows 8

Pre-Boot Authentication

User authentication before operating system loads. Customizable Pre-Boot Authentication text.

Supports Tokens for Secure Hardware Storage of Encryption Keys

Supports hardware tokens SafeNet (former Aladdin) eToken PRO and eToken Java.

Two-Factor Authentication with Removable Disk Drives

The software provides Two-Factor Authentication also with regular removable disks(like USB sticks).

User-Friendly Encryption

Initial encryption is transparent both for running applications and for Windows system modules. Initial encryption process can be paused and the user can continue the process or decrypt back at any time. Partially encrypted volumes are workable and can be dismouned and mounted again.

Option to Boot Encrypted Volumes Only from Trusted Network

Encryption keys can be stored on a network server. It opens an additional security level for enterprise use of the software. Since encryption keys are stored on remote server, access to encrypted computer will be possible only if it is connected to enterprise network.

Supports Trusted Platform Module (TPM) for Unattended Reboot

The feature is used to manage servers that are required to function around-the-clock. If such a server has boot/system volume encrypted, every reboot of the server requires pre-boot authentication. To solve the problem BCVE uses TPM hardware module for unattended reboot.

Secure Hibernation

If the user encrypts volume where Windows stores Hibernate File, BestCrypt Volume Encryption encrypts all write operations when Windows goes into Hibernate state and decrypts read operations when the computer wakes up from Hibernate state. Since pre-boot authentication is necessary at wake-up time, only the user who knows the proper password (and has hardware token, if used) can run computer from Hibernate mode.

Rescue Functions to Decrypt Volumes in Emergency Case

  • Bootable CD/DVD
  • Bootable USB
  • Rescue decryption of non-system volumes with Rescue File
  • Windows bootable Live CD.
Users reviews & testimonials

This software is not reviewed yet.

Advertising
Other downloads from this publisher

To protect your privacy, comply with regulations and prevent data breaches, BestCrypt delivers 'on-the-fly' data encryption that's easy to use for virtual drives, selected files and folders. BestCrypt encrypts files on Windows, Mac OS X and Linux.

Before selling, disposing or donating used computers, securely erase hard drives with BCWipe Total WipeOut. Trusted as the de-facto standard for the U.S. DoD, BCWipe Total WipeOut erases boot records, filesystem structures and operating system files.

Permanently delete data and wipe free space with BCWipe. BCWipe is trusted throughout the U.S. DoD to securely erase files and folder beyond recovery - including free space, file slack space and MFT records. Available for Windows, Mac and UNIX.