Skip to content

Protecting Data, Empowering Communities

30 Years of Innovation & Resilience in Data Protection

over

100 Countries

Rely on Jetico's solutions 

more than

30 Years

Of experience developing data protection software

Trusted by 

1M+ Customers

From the Pentagon to a family near you

Jetico

Data Protection – Trusted Worldwide Since 1995

Jetico solutions – BestCrypt and BCWipe – are trusted in over 100 countries by government and military agencies, national laboratories, industrial manufacturers and countless enterprises, as well as a wide global base of home and small business users.

Founded in 1995 in Tampere, Finland, and now headquartered near Otaniemi Science Park in the Helsinki Metropolitan Area, Jetico has spent 30 years developing unbreakable solutions that safeguard sensitive data.

At Jetico, we aim to be the best solution for protecting data at rest.
Beyond unbreakable security, we believe the best protection works the way you do – naturally, transparently and reliably.

As we celebrate our 30th anniversary, we honor our history of innovation and resilience, while looking forward to the future, including our new initiatives to give back to the community and promote sustainability.

Beyond the Code: 30 Years of People

To celebrate our 30th anniversary, we’ve created a special video series – Beyond the Code: 30 Years of People – highlighting the people behind the technology.

Meet our team and learn how resiliance, innovation and teamwork have fueled 30 years of data protection.

Tommi Rasila – Resilience Meets Integrity

Founder Tommi Rasila shares the story behind Jetico – from building the first crypto processor to staying true to a mission of pure and uncompromised security.

Watch on YouTube

Tommi Rasila interview 'Resilience Meets Integrity' to celebrate Jetico's 30th anniversary

Hannaleena Pojanluoma – Building Trust as a Team

CEO Hannaleena Pojanluoma shares her journey at Jetico – from stepping into cybersecurity a decade ago to fostering a culture built on trust and teamwork.

Watch on YouTube

Hannaleena Pojanluoma interview 'Building Trust as a Team' to celebrate Jetico's 30th anniversary

Alexey Boltunov – Innovation Powered by People

COO Alexey Boltunov shares what drives Jetico forward – from patented innovations in encryption and wiping to a strong culture of trust, teamwork and customer focus.

Watch on YouTube

Alexey Boltunov interview 'Innovation Powered by People' to celebrate Jetico's 30th anniversary

Our Journey

Jetico’s history is defined by milestones of innovation and adaptation.

Early Innovations Leading to Our Foundation

The team that would become Jetico commenced the development of encryption products. The first project was to design a customized chip to implement the complex GOST28147-89 encryption algorithm. Our LS06 RISC cryptoprocessor achieved top performance on the market.

In 1994, we designed encryption hardware for personal computers based on the LS06C20 cryptoprocessor.

Close-up of an isolated computer processor, symbolizing secure computing in air-gapped environments with advanced data protection technology by Jetico.

Jetico’s Foundation

Jetico board member, Tommi Rasila, founded Jetico in Tampere, Finland along with a team of highly skilled developers. Sergey Frolov and Alexander Pichuev have been leading Jetico development since the beginning.

BestCrypt software was developed step-by-step, beginning from a command-line encryption utility for DOS to 32-bit software for Windows 98/ME/NT/2000/XP, and then to 64-bit versions of Windows 10/8/7/Vista/XP/Windows Server 2003.

Lock for encryption software as first milestone in Jetico's story

Establishing the Foundations of the Wiping Industry

For over fifteen years, we have been working on a line of secure data deletion software – BCWipe and BCWipe Total WipeOut (formerly known as BCWipePD). The software is now in use by a significant number of government agencies around the world. Since it was published in the U.S. press, we can say on the record that our BCWipe software was used by Bill Clinton’s administration in the White House.

Abstract digital background with floating binary numbers in blue, symbolizing data flow, cybersecurity, and digital encryption concepts.

Cross-Platform Expansion

Today, Jetico offers BestCrypt and BCWipe for Windows, Linux and Mac. The portfolio has expanded to include solutions for Android, reflecting our commitment to addressing the evolving needs of users across various platforms.

We have built-in compatibility between encryption data formats for all our products. A user who bought BestCrypt for DOS4.x in 1993 and encrypted some data then, can now access it using our latest software.

A man interacting with a futuristic digital interface displaying cybersecurity and data protection elements, symbolizing advanced technology and cyber defense.

Thank You

We would like to thank everyone who has over the years provided us with comments and suggestions for software enhancements and additions. Read more about Our Gratitude.

Many of the suggestions have been incorporated into the software. Without them, our products would not be what they are. To share your feedback, please contact us.

Young man in a navy sweater working intently on a laptop at night in a modern office with dim lighting

Giving Back to the Community

Promoting Sustainability & Digital Inclusion

At Jetico, giving back means using our technology to make a positive impact: protecting privacy, enabling secure donations and helping organizations extend the life of their devices responsibly.
Through collaborations with non-profit and community partners, we turn data protection into an enabler for sustainability and inclusion.

Our Commitment

Every collaboration reflects Jetico’s belief that security should empower, not restrict.
By supporting these partners, we extend our mission beyond data protection – combining innovation, resilience and ethical action to build a more inclusive and sustainable digital future.

Enhance Your Data Protection Now

Request a free consultation with our data protection specialist to learn how our solutions can help you secure your endpoints.