Categories
Security

BestCrypt Corporate Encrypting Security for Windows

BestCrypt Corporate protects and manages sensitive data in corporate networks
BestCrypt Corporate provides protection of data in corporate networks using strong encryption algorithms.

BestCrypt Corporate includes standard BestCrypt software that performs encryption/decryption operations creating virtual drives acting as regular drives.

The core of BestCrypt Corporate is BestCrypt Central Manager that provides all range of functions: automatic installation/uninstallation and update of BestCrypt on remote client computers, creation of central Administrating Database on the server.

Central Administrating Database keeps tracks of all passwords used by client computers to create containers to keep data inside in encrypted form.

Secret data kept on client computers can be always accessed by Administrator, even if employee is away or gone.

Central Administrating Database can be also scheduled for automatic backup. BestCrypt Corporate is important tool to keep corporate networks secure and at the same time, it provides easy yet powerful way to manage secret data in networks consisting from 5 to 100 000 computers.

The BestCrypt software performs encryption using the strongest algorithms available including:

? The Rijndael (AES) algorithm in Cipher Block Chaining mode
? Russian Federal Standard GOST 28147-89 in Cipher Feedback mode
? Blowfish in Cipher Block Chaining mode
? Twofish in Cipher Block Chaining mode

Take BestCrypt Corporate for a test drive to see what it can actually do for you!

Here are some key features of “BestCrypt Corporate”:

? 1. Our new product BestCrypt Corporate Edition is specifically designed to satisfy every need of the corporate environment. BestCrypt Corporate Edition enables Windows NT/2000/XP Domain Administrators to remotely control all the functionality of BestCrypt software on any number of computers (including automatic installation and upgrading of client software and remote key management).
? 2. BestCrypt v.7 is fully compatible with Windows XP. Now encrypted virtual drives get additional support from standard Windows 2000 / Windows XP disk levels, as it can be seen from “Disk drives -> BestCrypt virtual drive” properties in Windows 2000/XP Device Manager after mounting BestCrypt drive.
? 3. Swap File Encryption utility is now included in BestCrypt software, version 7. The Swap File is a Windows system file that is used for virtual memory support. It can store portions of documents, that you were or are working with, in an opened form on the hard drive. Even if you have used a powerful program to encrypt one of your original documents, Windows can copy that document in whole or in part to the Swap file in decrypted form. Encryption keys, passwords, and other sensitive information can also be swapped to the hard drive. Even if you use all of the security features provided in the latest version of Windows, a simple investigation of the Swap file in DOS mode using readily available tools will give an intruder access to your most sensitive information. To the best of our knowledge, only BestCrypt v.7 can prevent such an attack on your data by allowing you to encrypt the contents of your Swap file.
? 4. BestCrypt v.7 can also create hidden containers that are not evident to an intruder. You can simply create another (hidden) container inside an already existing (shell) container. Data stored within shell and hidden containers can be completely different, passwords for the containers are also different, and it is impossible to tell whether or not a shell container is concealing a hidden container. The help documentation of Version 7 contains detailed information on the creation and management of hidden containers.
? 5. In earlier versions of BestCrypt, containers were supported only in the root directory. This limitation has been removed and you can now mount containers in sub-directories from BestCrypt Control Panel. Containers can now be mounted from remote computers without mapping remote disk resources.
? 6. The BestCrypt Control Panel now allows the organization of containers into separate groups. Such a group may include containers located in different directories and on remote computers. The user can group containers as required. Container grouping information is specific to individual users. This adds a new level of security where computers are used by multiple users with each user being required to mount their own containers.
? 7. BestCrypt v.7 includes Rijndael encryption algorithm. The algorithm was invented by Joan Daemen and Vincent Rijmen, and recently NIST selected the algorithm as an Advanced Encryption Standard (AES). For more information on the algorithm, visit the Rijndael Home Page. To provide continuity and compatibility with earlier versions, BestCrypt v.7 continues to support containers created earlier with the DES algorithm. However v.7 will not create any new DES containers, as the 56-bit key of DES can no longer be considered sufficiently secure.
? 8. BestCrypt v.7 allows the addition of new passwords for existing containers, created with the SHA-1 Key Generator. If you wish to allow another user to mount one of your containers, you can now assign a new additional password to a container specific to an individual user. This permits you to choose which users have access to particular containers.

Requirements:

? Windows NT/2000/2003 Server has to be configured as Domain Controller.

What’s New in This Release: [ read full changelog ]

ยท BestCrypt Corporate Edition includes the latest BestCrypt v.8.02.9 version.

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!