BestCrypt Corporate 1.12

BestCrypt Corporate 1.12 Screenshot BestCrypt Corporate provides protection of data in corporate networks using strong encryption algorithms.

Developer:   Jetico, Inc.
      software by Jetico, Inc. →
Price:  99.00  buy →
License:   Shareware
File size:   0K
Language:   
OS:   Windows Vista (?)
Rating:   0 /5 (0 votes)

BestCrypt Corporate provides protection of data in corporate networks using strong encryption algorithms.

BestCrypt Corporate includes standard BestCrypt software that performs encryption/decryption operations creating virtual drives acting as regular drives.

The core of BestCrypt Corporate is BestCrypt Central Manager that provides all range of functions: automatic installation/uninstallation and update of BestCrypt on remote client computers, creation of central Administrating Database on the server.

Central Administrating Database keeps tracks of all passwords used by client computers to create containers to keep data inside in encrypted form.

Secret data kept on client computers can be always accessed by Administrator, even if employee is away or gone.

Central Administrating Database can be also scheduled for automatic backup. BestCrypt Corporate is important tool to keep corporate networks secure and at the same time, it provides easy yet powerful way to manage secret data in networks consisting from 5 to 100 000 computers.

The BestCrypt software performs encryption using the strongest algorithms available including:

  • The Rijndael (AES) algorithm in Cipher Block Chaining mode
  • Russian Federal Standard GOST 28147-89 in Cipher Feedback mode
  • Blowfish in Cipher Block Chaining mode
  • Twofish in Cipher Block Chaining mode

    BestCrypt Corporate features
  • 1. Our new product BestCrypt Corporate Edition is specifically designed to satisfy every need of the corporate environment. BestCrypt Corporate Edition enables Windows NT/2000/XP Domain Administrators to remotely control all the functionality of BestCrypt software on any number of computers (including automatic installation and upgrading of client software and remote key management).
  • 2. BestCrypt v.7 is fully compatible with Windows XP. Now encrypted virtual drives get additional support from standard Windows 2000 / Windows XP disk levels, as it can be seen from "Disk drives -> BestCrypt virtual drive" properties in Windows 2000/XP Device Manager after mounting BestCrypt drive.
  • 3. Swap File Encryption utility is now included in BestCrypt software, version 7. The Swap File is a Windows system file that is used for virtual memory support. It can store portions of documents, that you were or are working with, in an opened form on the hard drive. Even if you have used a powerful program to encrypt one of your original documents, Windows can copy that document in whole or in part to the Swap file in decrypted form. Encryption keys, passwords, and other sensitive information can also be swapped to the hard drive. Even if you use all of the security features provided in the latest version of Windows, a simple investigation of the Swap file in DOS mode using readily available tools will give an intruder access to your most sensitive information. To the best of our knowledge, only BestCrypt v.7 can prevent such an attack on your data by allowing you to encrypt the contents of your Swap file.
  • 4. BestCrypt v.7 can also create hidden containers that are not evident to an intruder. You can simply create another (hidden) container inside an already existing (shell) container. Data stored within shell and hidden containers can be completely different, passwords for the containers are also different, and it is impossible to tell whether or not a shell container is concealing a hidden container. The help documentation of Version 7 contains detailed information on the creation and management of hidden containers.
  • 5. In earlier versions of BestCrypt, containers were supported only in the root directory. This limitation has been removed and you can now mount containers in sub-directories from BestCrypt Control Panel. Containers can now be mounted from remote computers without mapping remote disk resources.
  • 6. The BestCrypt Control Panel now allows the organization of containers into separate groups. Such a group may include containers located in different directories and on remote computers. The user can group containers as required. Container grouping information is specific to individual users. This adds a new level of security where computers are used by multiple users with each user being required to mount their own containers.
  • 7. BestCrypt v.7 includes Rijndael encryption algorithm. The algorithm was invented by Joan Daemen and Vincent Rijmen, and recently NIST selected the algorithm as an Advanced Encryption Standard (AES). For more information on the algorithm, visit the Rijndael Home Page. To provide continuity and compatibility with earlier versions, BestCrypt v.7 continues to support containers created earlier with the DES algorithm. However v.7 will not create any new DES containers, as the 56-bit key of DES can no longer be considered sufficiently secure.
  • 8. BestCrypt v.7 allows the addition of new passwords for existing containers, created with the SHA-1 Key Generator. If you wish to allow another user to mount one of your containers, you can now assign a new additional password to a container specific to an individual user. This permits you to choose which users have access to particular containers.

    Requirements
  • Windows NT/2000/2003 Server has to be configured as Domain Controller.

    tags bestcrypt corporate  swap file  bestcrypt software  block chaining  chaining mode  you can  the algorithm  can now  cipher block  hidden containers  the swap  client computers  administrating database  

    BestCrypt Corporate 1.12 screenshot


    Download BestCrypt Corporate 1.12

     Download BestCrypt Corporate 1.12

    Purchase:  Buy BestCrypt Corporate 1.12


    Authors software

    BestCrypt 8.04 beta BestCrypt 8.04 beta
    Jetico, Inc.

    BestCrypt software will create and will support encrypted virtual disks.

    BestCrypt Corporate 1.12 BestCrypt Corporate 1.12
    Jetico, Inc.

    BestCrypt Corporate provides protection of data in corporate networks using strong encryption algorithms.

    BCWipe 7.50.2 BCWipe 7.50.2
    Jetico, Inc.

    BCWipe ensures that another person will not restore files you have deleted from a disk.

    Similar software

    BestCrypt Corporate 1.12 BestCrypt Corporate 1.12
    Jetico, Inc.

    BestCrypt Corporate provides protection of data in corporate networks using strong encryption algorithms.

    BestCrypt 8.04 beta BestCrypt 8.04 beta
    Jetico, Inc.

    BestCrypt software will create and will support encrypted virtual disks.

    BestCrypt Key 7.9 BestCrypt Key 7.9
    Passware

    BestCrypt Key will recover passwords for virtual hard disks encrypted with BestCrypt (.

    BestCrypt Volume Encryption 5.12.3 BestCrypt Volume Encryption 5.12.3
    Jetico Inc.

    BestCrypt Volume Encryption software will provide transparent encrypting all the data stored on removable and fixed disk devices.

    CryptoExpert 2007 Professional 7.1.1 CryptoExpert 2007 Professional 7.1.1
    SecureAction Research LLC

    CryptoExpert is a software which will make transparent encryption using virtual hard drives.

    PrimaSoft Encryption - Service Edition 1.0 PrimaSoft Encryption - Service Edition 1.0
    PrimaSoft PC Inc

    PrimaSoft Encryption is a Windows program which allows you quickly and easely to run scheduled encryption and decryption sessions as a service process using the latest industry standard strong encryption algorithms: AES (US Advanced Encryption Standard, secret-key encryption also known as Rijndael); Twofish (secret-key encryption); RSA (public-key encryption) Features: ยท Encryption software: service process: You can run scheduled auto-recurring encryption and decryption sessions as a service process.

    CryptoForge 5.5.0 CryptoForge 5.5.0
    Ranquel Technologies

    CryptoForge is a suite of encryption tools for personal and professional security.

    Secured Drive 1.2 Secured Drive 1.2
    Tiasoft, LLC.

    Tiasoft Secured Drive is an easy-to-use encryption application that lets you create encrypted logical drive to keep your private and confidential data secure on personal computers, notebooks, and removable media.

    CryptoExpert Express 2.1 CryptoExpert Express 2.1
    SecureAction Research, LLC

    CryptoExpert Express is an application that encrypt important files CryptoExpert Express is easy to use on the fly encryption software with user friendly interface.

    P-Encrypt Secure Drive 1.2.2.3 P-Encrypt Secure Drive 1.2.2.3
    CadabraSoftware

    P-Encrypt Secure Drive (PESD) is a program that can create virtual encrypted disk drives.

    Other software in this category

    Paragon Encrypted Disk 3.02 Paragon Encrypted Disk 3.02
    Paragon Technologie GmbH

    Paragon Encrypted Disk - protect private and sensitive data from potential unauthorized access.

    Info-Lock Home Edition 1.1 Info-Lock Home Edition 1.1
    Info-Lock

    Info-Lock Home Edition offers you the perfect solution for securely locking your home desktop computer files from prying eyes.

    Adhaero Transit 1.010 Adhaero Transit 1.010
    Adhaero Technologies

    Adhaero Transit is a tool that enables safe e-business.

    Chameleon 2.0 Chameleon 2.0
    Globe Masters Software

    Encode It 2.01 Encode It 2.01
    Skylark Utilities

    Encode It will allow users to safely decrypt, encrypt or shred one or more files, including complete folders and all it`s sub folders in one easy step.