New Features
Security
- Support for scrypt key derivation algorithm.
BestCrypt Volume Encryption Enterprise Edition now uses scrypt algorithm to derive key from password.
- Enforcing strong encryption passwords.
Encryption administrators can now choose to only allow encryption passwords that score as Strong according to Zxcvbn password strength checker.
- Enforcing users to update their passwords.
For even better security and added protection against brute-force attacks, encryption administrators can now require end users to change encryption passwords after 3, 6 or 12 months.
- Enforcing strong passwords to access JCM web concole.
JCM administrator can now choose to only allow JCM web console passwords that meet special requirements.
- Support for Camellia encryption algorithm.
Widely recognized and time-proven Japanese encryption algorithm Camellia becomes the fifth encryption standard offered in BestCrypt Volume Encryption Enterprise Edition for encrypting hard drives and removable media.
Performance
- Encrypting existing data only.
Encryption compliance can now be achieved in less time with the option to skip the free space and to only process the space occupied by files when encrypting hard drives and removable media.
- Hardware acceleration for all algorithms.
New version takes advantage of the extended instruction set extending the benefits of hardware acceleration to Serpent, Camellia and Twofish in addition to AES. The software will automatically use the most superior option supported by given processor providing best operation with no noticeable performance impact.
Transparent operation
- Centralized management of Single Sign-On.
Single Sign-On allows for automatic enrollment into Windows after entering boot-time encryption password. Encryption administrators can now allow or disallow the use of Single Sign-On as part of encryption policy.
- Support for TPM.
The new version allows taking advantage of TPM hardware installed on encrypted endpoints as part of extended Suspend Protection options. Encryption administrators can additionally specify a number of times or exact hours when subject computer can restart with the use of TPM instead of authentication.
Usability
- Human-friendly names in Management Console.
The new version allows setting a human-friendly Display Name to be used as alternative to default hostnames in Jetico Central Manager console.
- BestCrypt Volume Encryption icon is system tray.
A useful shortcut to quickly mounting or dismounting encrypted disks now available in system tray area on encrypted endpoints
- Revamped user interface.
The new version of BestCrypt Volume Encryption client software was getting a new look and feel for even better user experience.