Jetico

Jetico

Data erasure and encryption solution set

 

 

 

 

BestCrypt – protect your hard drive if your hard drive is lost, stolen or confiscated

  • BestCrypt Volume Encryption – Encrypting hard disks
  • BestCrypt Container Encryption – Encrypt files and folders
Data encryption – BestCrypt products

 

  • Protect your data from physical and virtual threats
  • Compliance with regulatory requirements
  • Transparent automatic encryption
  • No loopholes
  • Recommended by international experts
  • Available for Windows, Mac and Linux
  • Centralized control

Шифрування файлів і папок

BestCrypt Container Encryption

 

Шифрування жорсткого диска

BestCrypt Volume Encryption

 

 

BestCrypt
Volume Encryption

BestCrypt
Container Encryption

BestCrypt
Suite

  • Protection against physical threats (computer stolen, lost, confiscated)
  • Password protection at the boot stage
  • Strong full-disk encryption
  • Industry-leading firmware support (UEFI, GPT, RAID)
  • No loopholes
  • Centralized management for enterprises
  • Protect your data from virtual threats (protect against hackers – on your computer and in the cloud)
  • Securely store and access selected files or folders on encrypted virtual disks
  • Cross-platform compatibility
  • No loopholes
  • Centralized management for enterprises
  • Protect your data from physical and virtual threats (lost hardware, protection against hackers – on your computer and in the cloud)
  • Permanent file deletion
  • Easy installation and licenses with universal access
  • Centralized management for enterprises

 

 

 

BestCrypt
Volume Encryption

Інші рішення для шифрування

Full disk encryption yes yes
Password protection at the download stage yes yes
HIPAA, GDPR, FIPS 140-2, AES 256 yes yes
Encrypting an external disk yes yes (partially)
Two-factor authentication (USB drives, eToken devices, Yubikey devices) yes yes (partially)
Support for all major operating systems yes yes (partially)
Support for single sign-on (SSO) yes no
A wide range of 256-bit encryption algorithms (AES, RC6, Serpent, Twofish, Camelia) yes no
TPM support yes (partially) no

 

 

Encrypted container technology Encryption of
files
Encrypt a single file yes yes
Upload to the cloud yes yes
Encrypt multiple files yes no
Encrypted metadata yes no
Hidden virtual disk yes no
Easy password management yes no
Masked containers in .mp4 yes no

 

 

BCWipe – protects data in case of sale or transfer of the hard disk and other media
BCWipe Total WipeOut – Clean up your hard disk
BCWipe – Delete files and folders

 

BCWipe
Total WipeOut
BCWipe
  • Disposal of drives and computers at the end of their useful life (decommissioning, recycling, sale)
  • Compliance with DoE and DoD cleanup requirements
  • Support for any hardware, regardless of OS
  • Support for SSD, NVMe, SSHD
  • Centralized data cleansing and reporting for enterprises
  • Securely delete files on active computers
  • For over 10 years, defense departments and large corporations have trusted BCWipe to prevent data leaks
  • Data deletion in accordance with GDPR, HIPAA, PCI, DSS
  • Available for Windows, Mac and UNIX
  • Centrally managed business package