Introduction

Easy to install, easy to use, totally transparent and available on all major platforms -- Windows, Linux and now Mac, too -- BestCrypt empowers you with strong encryption to securely store your confidential documents and private information.

BestCrypt utilizes globally trusted encryption algorithms and provides unparalleled protection against unauthorized data access.

Why Do You Need BestCrypt?

Nearly all information in the modern world exists in electronic form, or as data. The growing number of high-profile data breaches (i.e., incidents in which personal and public records, confidential information and intellectual property are leaked, lost or stolen) have created an urgent need for data protection solutions.

No information security strategy can be effective unless data is properly protected at the source, where it is stored. Data encryption is the most effective way to ensure the confidentiality of all sensitive data, eliminating the risks of data loss and data theft.

BestCrypt's best-of-breed data encryption protects and secures:

BestCrypt is the most powerful and proven data protection tool engineered for a wide range of users, from large multinational corporations to personal home users. BestCrypt empowers you with strong, built-in encryption algorithms to keep all classified documents classified. There are no "trap doors" (a feature in other encryption solutions that allows legal authorities to access protected data); only authorized users can access data protected by BestCrypt.

Whether at work or at home, you need a time-tested data encryption solution to protect and restrict access to all your data: BestCrypt.

Benefits of BestCrypt

Proven Data Protection Across All Major Platforms

BestCrypt supports all major operating systems -- Windows, Linux and Mac -- with the same level of advanced data protection to ensure that all your confidential data is accessible across all major platforms. BestCrypt enables support of multiple operating systems, and even multi-operating system environments, with full transparency for end users and a consistent management interface for administrators.

Data stored in a BestCrypt container is automatically encrypted, allowing only authorized users instant access to protected data. BestCrypt containers enable safe, secure sharing and transmission of data. Only authorized users have access to the transmitted protected data.

Strong Encryption Algorithms

Any trusted security system must use standard, open and published encryption methods (known as strong algorithms) to verify data protection reliability. BestCrypt empowers users to protect their data using many of today’s most used strong algorithms. Every algorithm is implemented with the largest possible key size defined in the algorithm's specification:

AlgorithmKey Size
3DES168-bit
AES (Rijndael)256-bit
Blowfish448-bit
GOST 28147-89256-bit
RC6256-bit
SERPENT256-bit
Twofish256-bit

In addition to the default LRW (Liskov, Rivest and Wagner) and CBC (cipher-block chaining) modes that are supported by all of the algorithms, BestCrypt also utilizes XTS encryption mode for AES, RC6, Serpent and Twofish. XTS mode is specially designed for applications working on disk sector level and is more secure than other popular modes used in the past, such as CBC mode.

Easy to Use

BestCrypt is so easy to use, you need only to enter the appropriate password. Once the password is verified, you can transparently access and use the data for any application. No further actions are needed to keep new or altered data in the secure encrypted state.

How It Works

All data on your computer is stored on disk drives. When you open a text file, for instance, the editing application asks your operating system (Windows, Linux or Mac OS X) to read the required file from the disk where it is located. File contents are then read from the disk drive and displayed by the editor.

With BestCrypt, you create encrypted virtual disk images called BestCrypt container files. Once you have entered the correct password to access it, BestCrypt mounts a virtual disk image stored in a container file as a new removable device. When the virtual disk is opened, you can read and write data as if it were a conventional hard disk, but with one major benefit: All the data stored on it is always encrypted. When any system application creates new files or writes data to existing files on a BestCrypt virtual disk, all of this new data is transparently encrypted before it is stored. Similarly, when any system application reads existing files from a BestCrypt virtual drive, first the encrypted data is read and then it is transparently decrypted before it is finally returned to the requesting application.

This way, all data stored on a virtual BestCrypt drive is always encrypted and becomes available only when you enter the correct container password. Of course, the size of a virtual drive is equal to size of the container it is stored in. A container file is still an ordinary file, so it is possible to back-up all encrypted data and then to restore it, in case there is a mishap. The BestCrypt system allows users to choose which cryptography algorithm and encryption mode is used for storing sensitive data. Different encryption algorithms can be used in different containers. Easy-to-use BestCrypt software has been developed to simplify all control procedures as well as to satisfy all security requirements, which is why BestCrypt has proven to be the ideal product for a wide range of users -- from the government services and commercial agencies to everyday people who keep private letters on their home computers, travel on business trips or use their laptops for storage.

Requirements

BestCrypt for Mac requires the following minimum computer configuration:

See also:

Quick Start Guide
Basic Concepts
Windows Compatibility Notes
Additional BestCrypt Utilities