Main menu

Pages

Jetico BestCrypt Data Encryption framework gives the most extensive and simple to-utilize secure information stockpiling and access control offices accessible.
This information encryption strategy by Jetico programming utilizes encryption calculations known around the world. What's more, gives unrivalled security against unapproved information access. BestCrypt is not difficult to introduce, simple to utilize and absolutely straightforward for application programs.


Your information is BestCrypt's just concern, and it improves your fundamental right to keep reports, business restrictive information, and confidential data, in a secret style.

Once kept in touch with a BestCrypt document (holder), information is never put away in an 'open' condition. However, BestCrypt's smooth activity and finish straightforwardness permit any approved client to get moment admittance to the information.

The high level of information encryption and approval innovation gives another degree of safety. With standard, demonstrated and distributed cryptographic calculations, safe secret phrase input, and straightforward encryption. This program makes and supports scrambled virtual plates, which are noticeable as customary circles with related drive letters. For instance, D:, K:, Z:, for example
Encryption algorithms:
  • AES (Rijndael) – 256-bit key.
  • Blowfish – 448-bit key.
  • CAST – 128-bit key.
  • GOST 28147-89 – 256-bit key.
  • RC6 – 256-bit key.
  • Serpent – 256-bit key.
  • Triple-Des – 168-bit key.
  • Twofish – 256-bit key.

The data stored on a BestCrypt disk is stored in the container file. A container is a file, so it is possible to back up a container, move or copy it to another disk (CD-ROM or network, for instance) and continue to access your encrypted data using BestCrypt.

Any free drive letter in the system you may use to mount and open an encrypted file container for access. As well, with BestCrypt,, you can mount the file container as a subfolder on the NTFS disk. When the virtual disk is opened, you can read and write data as if it were a conventional removable disk.

BestCrypt provides users with a higher security level as well as a set of new functions. Besides, there are several ways of encrypting data:

  • Storing encrypted data in containers and accessing the data through virtual drives (as earlier versions of the software do);
  • Encrypting a set of files into a single compressed and, if needed, self-extracting archive
  • Encrypting and accessing transparently whole Windows partitions/volumes

  • Updated BCWipe modules
  • Added check for ARM architecture during setup

Homepage – https://www.jetico.com

Supported Operating Systems:

  • Windows 11
  • Windows 10
  • Windows 8/8.1
  • Windows 7
  • Windows Vista (x86 only)
  • Windows Server 2019
  • Windows Server 2016
  • Windows Server 2012 (incl. R2)
  • Windows Server 2008 R2
  • Windows Server 2008 (x86 only)

Comments