4.0
AppVisor 1.0.43
https://publisher.appvisor.com
Portable Application Description, or PAD(TM) 2004 Association of Software Professionals (ASP)http://www.asp-shareware.org/pad is a data set standard and specification that is commercialsoftware publishers to disseminate certified information about their software application. The PAD format is copyright of the ASP and cannot be used without the formal licensing and permission of both the Association of Software Professionals and its agent AppVisor.com.
N
CMP-8B10006A8840
APP-5C10F8321A40
FALSE
BestCrypt Volume Encryption
BestCrypt Volume Encryption
pid-09104e767640
bid-8b10006a8840
Jetico Inc. Oy
Finland
Uusimaa
Espoo
02150
Tekniikantie 14
https://www.jetico.com
Jetico Inc. Oy
Jetico Inc. Oy
pad_file@jetico.com
Jetico Inc. Oy
Jetico Inc. Oy
pad_file@jetico.com
+358-9-251 73030
pad_file@jetico.com
pad_file@jetico.com
pad_file@jetico.com
+358-9-251 73030
+358-9-251 73030
+358-9-251 73030
+358-9-251 73030
https://www.linkedin.com/company/jetico-inc-oy/
https://twitter.com/jeticosoftware?lang=en
https://www.facebook.com/jeticosoftware/
app-5c10f8321a40
BestCrypt Volume Encryption
5.12.3
12
18
2023
119.40
Shareware
Security & Privacy::Encryption Tools
Utilities
Security Tools :: PC Access Control
Major Update
Install and Uninstall
Windows
Win2000,WinXP,Win7 x32,Win7 x64,Windows 8,Windows 10,WinServer,WinOther,WinVista,WinVista x64
English,Arabic,Chinese,Czech,Dutch,French,German,Italian,Japanese,Persian,Polish,Russian,Spanish
Improved the process of automatic recovery for encrypted volumes
3 MB of hard drive space
free trial for three weeks
62291968
60832
59.41
Y
21
Days
https://www.jetico.com/data-encryption/encrypt-hard-drives-bestcrypt-volume-encryption
https://www.jetico.com/online-shop/encryption
https://www.jetico.com/file-downloads/web_help/bcve5/bcve_screenshot_min.png
http://repository.appvisor.com/images/system_tray_icon.png
http://repository.appvisor.com/info/app-5c10f8321a40/BestCrypt_Volume_Encryption_pad.xml
https://www.jetico.com/how-install-register-bestcrypt-volume-encryption
https://www.jetico.com/how-encrypt-your-computer
http://www.jetico.com/bcve_setup.exe
encryption software, disk encryption, disk encryption software, UEFI encryption, whole disk encryption, data encryption, truecrypt alternative
BestCrypt Volume for Disk Encryption
BestCrypt Volume for Disk Encryption protects all data on fixed/removable disks
BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks.
BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.
BestCrypt Volume for Disk Encryption protects all data on all types of volumes residing on fixed and removable disks - simple volumes, mount points, multipartition volumes (spanned, mirrored, striped, RAID-5), while also working on UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats - such as lost computers and USB sticks - to protect your privacy and comply with regulations (HIPAA, PCI). BestCrypt Volume Encryption utilizes a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes. By working with volumes, Jetico's disk encryption is the best TrueCrypt alternative.
Disk encryption features:
- Encrypt system and boot volumes
- Support for UEFI-based computers, including secure boot
- Encrypt RAID and all types of volumes residing on fixed and removable disks
- Pre-boot authentication
- Support for Tokens for secure hardware storage of encryption keys
- Two-factor authentication with removable disk drives
- User-friendly encryption
- Option to boot encrypted volumes only from trusted network
- Support for Trusted Platform Module (TPM) for unattended reboot
- Secure hibernation
- Rescue functions to decrypt volumes in emergency case
- Central management for deployment, monitoring, encryption policy distribution and password recovery (Enterprise Edition only)
Jetico is author and vendor of the software
BESTCRYPT VOLUME ENCRYPTION - PRODUCT LICENSE INFORMATION
NOTICE TO USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT. USE OF THE BESTCRYPT VOLUME ENCRYPTION SOFTWARE PROVIDED WITH THIS AGREEMENT (THE 'SOFTWARE') CONSTITUTES YOUR ACCEPTANCE OF THESE TERMS. IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, DO NOT INSTALL AND/OR USE THIS SOFTWARE. USER'S USE OF THIS SOFTWARE IS CONDITIONED UPON COMPLIANCE BY USER WITH THE TERMS OF THIS AGREEMENT.
1. LICENSE GRANT. Jetico Inc. Oy grants you a license to use one copy of the version of this SOFTWARE on any one system for as many licenses as you purchase. 'You' means the company, entity or individual whose funds are used to pay the license fee. 'Use' means storing, loading, installing, executing or displaying the SOFTWARE. You may not modify the SOFTWARE or disable any licensing or control features of the SOFTWARE except as an intended part of the SOFTWARE's programming features. When you first obtain a copy of the SOFTWARE, you are granted an evaluation period of not more than 30 days, after which time you must pay for the SOFTWARE according to the terms and prices discussed in the SOFTWARE's documentation, or you must remove the SOFTWARE from your system. This license is not transferable to any other system, or to another organization or individual. You are expected to use the SOFTWARE on your system and to thoroughly evaluate its usefulness and functionality before making a purchase. This 'try before you buy' approach is the ultimate guarantee that the SOFTWARE will perform to your satisfaction; therefore, you understand and agree that there is no refund policy for any purchase of the SOFTWARE.
2. OWNERSHIP. The SOFTWARE is owned and copyrighted by Jetico, Inc. Your license confers no title or ownership in the SOFTWARE and should not be construed as a sale of any right in the SOFTWARE.
3. COPYRIGHT. The SOFTWARE is protected by copyright law of Finland and international treaty provisions. You acknowledge that no title to the intellectual property in the SOFTWARE is transferred to you. You further acknowledge that title and full ownership rights to the SOFTWARE will remain the exclusive property of Jetico, Inc and you will not acquire any rights to the SOFTWARE except as expressly set forth in this license. You agree that any copies of the SOFTWARE will contain the same proprietary notices which appear on and in the SOFTWARE.
4. REVERSE ENGINEERING. You agree that you will not attempt to reverse compile, modify, translate, or disassemble the SOFTWARE in whole or in part.
5. NO OTHER WARRANTIES. JETICO, INC DOES NOT WARRANT THAT THE SOFTWARE IS ERROR FREE. JETICO, INC DISCLAIMS ALL OTHER WARRANTIES WITH RESPECT TO THE SOFTWARE, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES OR LIMITATIONS ON HOW LONG AN IMPLIED WARRANTY MAY LAST, OR THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATIONS OR EXCLUSIONS MAY NOT APPLY TO YOU. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS AND YOU MAY ALSO HAVE OTHER RIGHTS WHICH VARY FROM JURISDICTION TO JURISDICTION.
6. SEVERABILITY. In the event of invalidity of any provision of this license, the parties agree that such invalidity shall not affect the validity of the remaining portions of this license.
7. NO LIABILITY FOR CONSEQUENTIAL DAMAGES. IN NO EVENT SHALL JETICO, INC OR ITS SUPPLIERS BE LIABLE TO YOU FOR ANY CONSEQUENTIAL, SPECIAL, INCIDENTAL OR INDIRECT DAMAGES OF ANY KIND ARISING OUT OF THE DELIVERY, PERFORMANCE OR USE OF THE SOFTWARE, EVEN IF JETICO, INC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL JETICO, INC' LIABILITY FOR ANY CLAIM, WHETHER IN CONTRACT, TORT OR ANY OTHER THEORY OF LIABILITY, EXCEED THE LICENSE FEE PAID BY YOU, IF ANY.
8. GOVERNING LAW. This license will be governed by the laws of Finland as they are applied to agreements between Finland residents entered into and to be performed entirely within Finland. The United Nations Convention on Contracts for the International Sale of Goods is specifically disclaimed.
9. ENTIRE AGREEMENT. This is the entire agreement between you and Jetico, Inc which supersedes any prior agreement or understanding, whether written or oral, relating to the subject matter of this license.
©Jetico Inc. Oy
Y
1.4
http://www.asp-shareware.org/pad/extensions/Affiliates.htm
Jetico Inc. Oy
Jetico Inc. Oy
pad_file@jetico.com
<h1>Jetico Disk Encryption Delivers Industry's Best UEFI Compatibility</h1>
HELSINKI, Finland – March 18, 2014 – To expand use of disk encryption for UEFI, Jetico has announced a convenient update to their acclaimed disk encryption software. The world's first native encryption software for disk volumes, BestCrypt Volume Encryption is now fully compatible with the latest UEFI-based computers from all known major brands.
Unified Extensible Firmware Interface (UEFI) has revolutionized the way computers boot. UEFI support has been implemented in many different ways by motherboard and laptop vendors. Diversity in UEFI platforms has affected the ability of disk encryption to work consistently on various systems.
Jetico CEO Michael Waksman explains, 'We developed this new version after analyzing many reported issues with UEFI support. Unlike alternative disk encryption tools that fall short in secure booting, BestCrypt Volume Encryption now provides the industry's best compatibility with UEFI systems.'
Waksman continues, 'We've noticed that bigger, more widely-known encryption vendors are struggling with supporting UEFI. Free open-source tools have not yet addressed this issue at all. This release helps separate Jetico from the pack, while also aligned with our mission to be the most agile developer of data protection software.'
In addition to improved support for UEFI-based computers, BestCrypt Volume Encryption version 3.62.11 continues to feature:
Pre-boot authentication - including customization of all text displayed on screen at required password entry
Support for Windows 8
Support for GUID Partition Table (GPT)
Support for Trusted Platform Module (TPM) for unattended reboot
Two-factor authentication with removable disk drives
Trusted encryption algorithms (AES Rijndael, Serpent, Twofish) with the largest possible key size in advanced security XTS encryption mode
Powerful yet easy to use, BestCrypt Volume Encryption is engineered for a wide range of users – from experts at large organizations to people at home. Jetico's encryption software provides peace of mind and compliance to anyone concerned with protecting sensitive data on lost or stolen computers.
Since Jetico's original release of volume encryption software 8 years ago, BestCrypt Volume Encryption has reliably delivered a user friendly solution for transparent encryption of data kept on both fixed and removable storage devices - from older MS-DOS styled volumes through to modern Spanned, Striped, Mirrored or RAID-5 volumes, and Windows 8 Storage Spaces.
<i>About Jetico<i>
Jetico provides military-standard data protection software for sensitive and mission-critical data throughout the lifecycle. Trusted for 10+ years by the U.S. Department of Defense, Jetico's BCWipe wipe selected files beyond forensic recovery, while BCWipe Total WipeOut can erase hard drive data entirely. BestCrypt delivers disk encryption that's easy to use.
disk encryption, UEFI encryption, Windows 8 encryption, software encryption
Jetico Disk Encryption Delivers Industry's Best UEFI Compatibility
Jetico's disk encryption software, BestCrypt Volume Encryption, now provides the industry's best UEFI and Windows 10 encryption.
Jetico Disk Encryption Delivers Industry's Best UEFI Compatibility
HELSINKI, Finland – March 18, 2014 – To expand use of disk encryption for UEFI https://www.jetico.com/products/enterprise-data-protection/bestcrypt-volume-encryption, Jetico has announced a convenient update to their acclaimed disk encryption software https://www.jetico.com/products/enterprise-data-protection/bestcrypt-volume-encryption. The world's first native encryption software for disk volumes, BestCrypt Volume Encryption https://www.jetico.com/products/enterprise-data-protection/bestcrypt-volume-encryption is now fully compatible with the latest UEFI-based computers from all known major brands.
Unified Extensible Firmware Interface (UEFI) has revolutionized the way computers boot. UEFI support has been implemented in many different ways by motherboard and laptop vendors. Diversity in UEFI platforms has affected the ability of disk encryption to work consistently on various systems.
Jetico CEO Michael Waksman explains, 'We developed this new version after analyzing many reported issues with UEFI support. Unlike alternative disk encryption tools that fall short in secure booting, BestCrypt Volume Encryption now provides the industry's best compatibility with UEFI systems.'
Waksman continues, 'We've noticed that bigger, more widely-known encryption vendors are struggling with supporting UEFI. Free open-source tools have not yet addressed this issue at all. This release helps separate Jetico from the pack, while also aligned with our mission to be the most agile developer of data protection software.'
In addition to improved support for UEFI-based computers, BestCrypt Volume Encryption version 3.62.11 continues to feature:
- Pre-boot authentication - including customization of all text displayed on screen at required password entry
- Support for Windows 8
- Support for GUID Partition Table (GPT)
- Support for Trusted Platform Module (TPM) for unattended reboot
- Two-factor authentication with removable disk drives
- Trusted encryption algorithms (AES Rijndael, Serpent, Twofish) with the largest possible key size in advanced security XTS encryption mode
Powerful yet easy to use, BestCrypt Volume Encryption is engineered for a wide range of users – from experts at large organizations to people at home. Jetico's encryption software https://www.jetico.com/products/enterprise-data-protection/bestcrypt-volume-encryption provides peace of mind and compliance to anyone concerned with protecting sensitive data on lost or stolen computers.
Since the original release of volume encryption https://www.jetico.com/products/enterprise-data-protection/bestcrypt-volume-encryption software 8 years ago, BestCrypt Volume Encryption has reliably delivered a user friendly solution for transparent encryption of data kept on both fixed and removable storage devices - from MS-DOS styled volumes to Spanned, Striped, Mirrored or RAID-5 volumes, an Windows 8 Storage Spaces.
http://www.jetico.com/about-jetico/newsroom/446-jetico-disk-encryption-delivers-industry-s-best-uefi-compatibility
Jetico Inc. Oy
http://www.jetico.com/
wipe selected files, data protection software, erase entire hard drives, encryption software
Jetico provides pure and simple data protection software - encryption & wiping
Jetico provides pure and simple data protection software - encryption & wiping - for National Security, Compliance and Personal Privacy.
Jetico provides pure and simple data protection software for National Security, Compliance and Personal Privacy. Trusted for over 10 years by the top security organizations in the world, Jetico's BCWipe can wipe selected files beyond forensic recovery, while BCWipe Total WipeOut can erase hard drives such as for disposal or decommission. To protect stored data, Jetico's BestCrypt delivers encryption software for whole disks, files & folders.
Jetico Inc. Oy
Jetico Inc. Oy
pad_file@jetico.com
N
TRUE
TRUE
FALSE
http://repository.appvisor.com/
BestCrypt_Volume_Encryption_pad.xml
http://www.jetico.com/bcve_setup.exe
bcve_setup.exe