Tag Archives: disk encryption

BestCrypt Volume Encryption 5.12

Product Page: https://www.jetico.com/data-encryption/encrypt-hard-drives-bestcrypt-volume-encryption

bcve_screenshot_min.png

BestCrypt Volume for Disk Encryption protects all data on all types of volumes residing on fixed and removable disks – simple volumes, mount points, multipartition volumes (spanned, mirrored, striped, RAID-5), while also working on UEFI and GPT partitions. Jetico’s encryption software provides protection from physical threats – such as lost computers and USB sticks – to protect your privacy and comply with regulations (HIPAA, PCI). BestCrypt Volume Encryption utilizes a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes. By working with volumes, Jetico’s disk encryption is the best TrueCrypt alternative.
Disk encryption features:
– Encrypt system and boot volumes
– Support for UEFI-based computers, including secure boot
– Encrypt RAID and all types of volumes residing on fixed and removable disks
– Pre-boot authentication
– Support for Tokens for secure hardware storage of encryption keys
– Two-factor authentication with removable disk drives
– User-friendly encryption
– Option to boot encrypted volumes only from trusted network
– Support for Trusted Platform Module (TPM) for unattended reboot
– Secure hibernation
– Rescue functions to decrypt volumes in emergency case
– Central management for deployment, monitoring, encryption policy distribution and password recovery (Enterprise Edition only)

Cryptainer Enterprise Encryption Software 17.0.2.0

Product Page: https://www.cypherix.com/cryptainerse/

cryptainer-screenshot.jpg

Cryptainer Enterprise Encryption software uses strong Blowfish at 448 bits and AES at 256 bits. Cryptainer Enterprise has all the functionality of Cryptainer, plus an additional administrative module for password recovery. The end-user interface is identical to that of Cypherix products, the award winning, easy-to-use encryption software. Cryptainer protects your privacy by keeping your data private and secure on your PC as well as on your removable storage. Specially tailored to meet the growing security and privacy needs of the enterprise user, combines the ease of use and simple drag-and-drop operations. Extra Protection Using License Key feature embeds your license key into the vault. This way Cryptainer Enterprise installs with the same license key can open the vault. Other Cryptainer installs will not be able to access your data even with the password. Administrative module provides single point control and monitoring of distributed vaults.

Cryptainer Enterprise protects any file, folder, pictures, media with strong encryption on any Windows PC. Simple, Secure encryption program that creates vaults within which all sensitive information can be stored. Once mounted, the vault behaves as a standard windows drive. Cryptainer includes Password strength and monitor meter for setting up effective and strong passwords. Just Drag and Drop to hide any data of any kind in a strong password protected vault. Cryptainer’s ease of use and deployment coupled with its speed and versatility makes it an ideal security tool for all environments. Cryptainer includes virtual keyboard and privilege mode option that can help to prevent a keylogger from capturing keystrokes. Cryptainer Enterprise ensures complete security for your data and protects access to your data. Hides all data on any media. Save Encrypted vaults to Cloud Storage Providers. Shred files securely. Send secure email. Runs on all versions of Windows PC. A must have for every business.

BestCrypt Volume Encryption 5.11.4

Product Page: https://www.jetico.com/data-encryption/encrypt-hard-drives-bestcrypt-volume-encryption

bcve_screenshot_min.png

BestCrypt Volume for Disk Encryption protects all data on all types of volumes residing on fixed and removable disks – simple volumes, mount points, multipartition volumes (spanned, mirrored, striped, RAID-5), while also working on UEFI and GPT partitions. Jetico’s encryption software provides protection from physical threats – such as lost computers and USB sticks – to protect your privacy and comply with regulations (HIPAA, PCI). BestCrypt Volume Encryption utilizes a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes. By working with volumes, Jetico’s disk encryption is the best TrueCrypt alternative.
Disk encryption features:
– Encrypt system and boot volumes
– Support for UEFI-based computers, including secure boot
– Encrypt RAID and all types of volumes residing on fixed and removable disks
– Pre-boot authentication
– Support for Tokens for secure hardware storage of encryption keys
– Two-factor authentication with removable disk drives
– User-friendly encryption
– Option to boot encrypted volumes only from trusted network
– Support for Trusted Platform Module (TPM) for unattended reboot
– Secure hibernation
– Rescue functions to decrypt volumes in emergency case
– Central management for deployment, monitoring, encryption policy distribution and password recovery (Enterprise Edition only)