Tuesday, May 17, 2016

BestCrypt Volume Encryption 3.60.15





Jetico's BestCrypt Volume Encryption software is an evolved class of encryption products that allows users to encrypt old MS-DOS style partitions, modern volumes residing on a of physical devices - for example Spanned, Striped, Mirrored or RAID-5 volumes - and 8 Storage Spaces.

New ftures in version 3

BestCrypt Volume Encryption version 3 provides the next evolution in performance and security from the pioneers in native encryption for volumes.

1. More robust support of encrypted volumes. To reconfigure the size, loion or type of software RAID, rlier versions of the software first required decryption of the encrypted volumes. Now version 3 of BestCrypt Volume Encryption automatically adapts its internal information for encrypted volumes when changing their configuration. (Rd Update Notes)
2. Two-Factor Authentiion with conventional removable s (like USB sticks). With version 3 of BestCrypt Volume Encryption, encryption can be moved to removable storage.So anyone who wants to access an encrypted volume must: 1) know for the ; 2) have the removable where the is stored. (Rd Update Notes)
3. Added layer of security by booting of encrypted volumes from trusted network. In this case, encryption of boot/system volumes are not stored on the local computer, but on a network server. Enterprises can now benefit from an additional level of security. Since encryption are stored on an enterprise server, access to encrypted computers will be only possible when connected to the enterprise network. (Rd Update Notes)
4. Speed boost from support for new machine instructions (AES-NI) in the latest processors. As a result, speed of the AES encryption module utilizing AES-NI instructions incrsed up to 5 times. access to the encrypted volumes now operate up to 30% faster.
5. Faster initial encryption. rlier versions of the software encrypted a whole volume sector-by-sector, including unused space. If is large (terabytes), initial encryption process requires dozens of hours. In version 3 of BestCrypt Volume Encryption, if the volume is empty, the user can run Format and encrypt process that will avoid long sector-by-sector encryption. The volume will be just marked as 'encrypted' and all the data written to the volume later will be encrypted. Unused space remains unencrypted. Optionally, the user can run Erase, format and encrypt process. In that case, the volume will be wiped (overwritten), formatted and marked for encryption.
6. Secure unattended reboot. Version 3 of BestCrypt Volume Encryption utilizes Trusted Platform Module (TPM) hardware available on many motherboards for the purpose of unattended reboot of computers with encrypted boot/system volumes. This fture is necessary to manage servers that are required to function around the clock. If such a server has an encrypted boot/system volume, every reboot of the server requires manual entry at boot time. With this new fture, a server administrator can choose an interval of time when BestCrypt Volume Encryption (with help of TPM) should support unattended reboot of the server. (Rd Update Notes)
7. Support of eToken Pro Java hardware from SafeNet (former Aladdin). rlier versions of BestCrypt Volume Encryption supported Two-Factor Authentiion with the help of eToken R2 and eToken Pro hardware. eToken Pro Java is the latest hardware designed by SafeNet for such a purpose.
8. Added convenience for mounting volumes and protection against accidental formatting. When discovers that an encrypted unmounted volume has been connected, it asks for the volume to be formatted. In some cases, this resulted in accidental formatting of encrypted volumes. Version 3 of BestCrypt Volume Encryption now has the option to disable formatting messages and offers an additional option to suggest mounting the volume for access.
9. Added support for other physical sector sizes. devices with physical sector sizes other than 512 bytes are now supported in version 3 of BestCrypt Volume Encryption.


OS : XP, Vista, 7, 8 (32-bit / 64-bit)
Language : Multilingual.




DOWNLOAD : LINK HEre

OR LINK HEre

No comments:

Post a Comment