BestCrypt Corporate provides protection of data in corporate networks using strong encryption algorithms. BestCrypt Corporate includes standard BestCrypt software that performs encryption/decryption operations creating virtual drives.
BCArchive 2.06.4 With BCArchive software you may encrypt and compress a group of files/folders to an encrypted archive (i.e. single file). You may store all you confidential files in such archive and/or e-mail it to your friend.
BCWipe 6.09.6 Permanently delete data and wipe free space with BCWipe. BCWipe is trusted throughout the U.S. DoD to securely erase files and folder beyond recovery - including free space, file slack space and MFT records. Available for Windows, Mac and UNIX.
Description: BestCrypt Corporate provides protection of data in corporate networks using strong encryption algorithms. BestCrypt Corporate includes standard BestCrypt software that performs encryption/decryption operations creating virtual drives acting as regular drives. The core of BestCrypt Corporate is BestCrypt Central Manager that provides all range of functions: automatic installation/uninstallation and update of BestCrypt on remote client computers, creation of central Administrating Database on the server. Central Administrating Database keeps tracks of all passwords used by client computers to create containers to keep data inside in encrypted form. Secret data kept on client computers can be always accessed by Administrator, even if employee is away or gone. Central Administrating Database can be also scheduled for automatic backup. BestCrypt Corporate is important tool to keep corporate networks secure and at the same time, it provides easy yet powerful way to manage secret data in networks consisting from 5 to 100 000 computers.
BestCrypt 8.23 BestCrypt is easy-to-use, powerful data encryption software. You allocate a portion (container) of free space of your drive where you keep all your sensitive data in encrypted
Jetico Personal Firewall 220.127.116.11 Jetico Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and