Pros

  • Comprehensive security
  • No-nonsense and classy interface

Cons

  • Pricey

At A Glance

The best is expensive, but your money buys you a classy complete security solution in BestCrypt. Most end-users, however, will do fine with freebies such as TrueCrypt.

Manufacturer’s Description

BestCrypt brings peace of mind by keeping information on laptops, mobile devices, PCs and servers safe, protected and under control. It delivers robust data protection and removal in a simple, strong and easily deployed solution operating automatically and transparently to the user with broad platform support. It provides highest level of security and control by combining strong disk encryption, reliable data wiping, and access control. BestCrypt supports wide range of applications and usage scenarios. Whether you are in financial, health care, hospitality, insurance or telecommunication industry, or you work for govermental or military organization, or you are a developer designing a new product, or you keep your private correspondence on your computer, you will enjoy the comprehesive data security and control that BestCrypt provides. BestCrypt protects data with industry standard full key length encryption using AES, Blowfish, CAST, RC6, Serpent and Twofish methods in LRW encryption mode. Data wiping employs DoD 5200.28-STD and Peter Gutmann data shredding schemes rendering information in deleted files, free disk space, swap file, empty directory entries and file slack unrecoverable. Additional features included are: support for Spanned, Striped, Mirrored or RAID-5 volumes, swap-file encryption, "hidden" containers, Container Guard utility, Keyboard Filter, creation of encrypted self-extracting file archive.

Manufacturer’s Website

Jetico, Inc.