Products of this category
Copysafe PDF Converter 1.4
CopySafe PDF is the most secure solution for distributing copy protected PDF files and the only solution that can copy protect PDFs from all avenues of copy including Printscreen and ALL screen capture.
Copysafe PDF Protector 3.0
CopySafe PDF provides the most secure copy protection for eBook and PDF documents with the option of preventing sharing and expiry by hours or days from first use. Ideal for secure distribution by email, download, CD or displayed on your web page.
Copysafe Web 4.0
Copysafe Web is the most secure solution available for copy protection of web pages and images from all methods of copying including Printscreen and screen capture.

BestCrypt Volume Encryption 2.15.01

BestCrypt Volume Encryption 2.15.01

5 Stars
Select your Rating:
Publisher: Jetico Inc
License: Shareware
Size: 3.3 MB
Date added: 2012-12-12
Downloads: 109
Downloads - Last week: 3
Price: $99.95



BestCrypt Volume EncryptionTM software provides transparent encryption of all the data stored on fixed and removable disk devices. BestCrypt Volume Encryption software is a new class of volume encryption products that allows users to encrypt old MS-DOS style disk partitions as well as modern volumes residing on a number of physical disk devices - for example Spanned, Striped, Mirrored or RAID-5 volumes. Main Features: 1. Encrypts all types of volumes residing on fixed and removable disks: * Simple volume, i.e. volume consisting of one disk partition. * Mount point - volume mounted as a sub-folder on NTFS-formatted volume. * Multipartition volume, i.e. volume consisting of several disk partitions: 1. Spanned volumes; 2. Mirrored volumes; 3. Striped volumes; 4. RAID-5 volumes. 2. BestCrypt Volume Encryption allows encrypting data with many strong encryption algorithms. Every algorithm is implemented with the largest possible key size defined in the algorithm's specification: * AES (Rijndael) - 256-bit key. * RC6 - 256-bit key. * Serpent - 256-bit key. * Twofish - 256-bit key. BestCrypt Volume Encryption utilizes XTS Encryption Mode with all encryption algorithms listed above. XTS Mode is designed specifically for applications working on the disk sector level and is more secure than other popular modes used previously, such as LRW or CBC mode. 3. BestCrypt Volume Encryption can encrypt the volume from which Windows boots from, as well as the volume where Windows stores its system files (including Registry, Page file and Hibernate file). Initial encryption is transparent both for running applications and for Windows system modules. 4. BestCrypt Volume Encryption performs Computer Pre-Boot Authentication if the system or boot volume/partition is encrypted -- which means that BestCrypt Volume Encryption loads before operating system and allows the computer to boot only after entering a proper password. 5. BestCrypt Volume Encryption provides an easy way to customize Pre-Boot Authentication texts appearing when the user is required to enter password. This feature allows displaying additional hints when the user is being prompted to enter a password and even hides the fact that pre-boot authentication is running. 6. BestCrypt Volume Encryption supports hardware tokens Aladdin eToken R2 and PRO as a secure hardware storage for encryption keys. With hardware token users get two levels of protection for encrypted data, because in addition to a password it is necessary to connect a small hardware token where the encryption key is stored. 7. BestCrypt Volume Encryption provides Secure Hibernating. If a user encrypts the volume where Windows stores the Hibernate File, BestCrypt Volume Encryption encrypts all write operations when Windows goes into Hibernate state and decrypts read operations when the computer wakes up from Hibernate state. Since pre-boot authentication is necessary at wake-up time, only the user who knows the proper password (and has hardware token, if used) can run the computer from Hibernate mode. Secure Hibernating is a functionality that must be implemented in BestCrypt Volume Encryption, otherwise all data written at Hibernate time (together with encryption keys) appears on disk in opened decrypted form. 8. As well as the Hibernate File, BestCrypt Volume Encryption encrypts Windows Crash Dump Files. Windows writes files in a very special way because when a crash occurs the regular disk write operations cannot be used. Without encrypting Crash Dump Files, the security level of the software is significantly lower because the files can store a snapshot of memory together with encryption keys on disk in opened decrypted form.




OS: Windows2000; Windows2003; WinNT 4.0; WinXP; Windows Vista; Windows Vista x64; Windows 7; Windows 7 x64
Keywords of BestCrypt Volume Encryption
Downloads from Jetico Inc
BestCrypt Traveller 1.03.5 -  BestCrypt TravellerTM allows quick access to encrypted container files created by BestCrypt. BestCrypt Traveller starts working without installation of the software. After running a single executable file (BCTraveller. ... (9/0) download
BCWipe Total WipeOut 2.3 -  Before disposing of or giving away a laptop, desktop, external hard drive or other removable media, you must be certain that all private data has been erased without any chance of recovery. ... (91/4) download
BestCrypt Volume Encryption 3.00.18 Beta 1.0 -  BestCrypt Volume EncryptionTM software provides transparent encryption of all the data stored on fixed and removable disk devices. ... (10/0) download
Related Press, Software News