Jetico Product Release Notes: Jetico Central Manager v.4
Note: This document is regularly updated and is subject to change without notice. We invite you to share your feedback with us, including reporting issues with our products, via our online contact form.
Minimum System Requirements
Hardware Requirements for JCM Server
- RAM 2 GB
- Free disk space 6 GB
Supported Operating Systems for JCM Server
- Windows 10
- Windows 8.x
- Windows 7
- Windows Vista SP2
- Windows Server 2008 R2 SP1
- Windows Server 2012 and 2012 R2
Required Software for JCM Server
- Oracle Java 8+
- MySQL Server v.5.5+
- Redis v.2.8+
Supported Browsers for JCM Console
JCM Console will run on any one of the compatible, HTTPS enabled web browsers listed below, regardless of operating system.
Desktop/Laptop Browsers
- Google Chrome
- Mozilla Firefox
- Internet Explorer V.9+
- MS Edge
- Opera
- Safari
Mobile Browsers
- Android 4.2+
- iOS 8+
For all Browsers
- HTTPS protocols must be enabled
- JavaScript must be enabled
- Cookies must be enabled
- Images must not be blocked
Supported Operating Systems for JCM Clients
- Any Windows starting Windows XP
- Any MacOS starting MacOS X 10.9
Product Updates
04-March-2020 | server v.4.2.0 | client v.4.23.01 | agent 1.02.04 |mac client v.1.2.0
- Added support for Mac client computers with T2 security chip
29-Oct-2019 | server v.4.1.0 | client v.4.18.00 | agent 1.02.03 |mac client v.1.1.0
- Added support for Mac client computers
- Added requirement to set strong passwords for JCM Console users (optional)
- Fixed minor bugs
18-Oct-2019 | server v.4.0.1 | client v.4.18.00 | agent 1.02.03
- Updated client software to comply with Windows 10’s November 2019 Update (19H2)
29-July-2019 | server v.4.0.1 | client v.4.07.10 | agent 1.02.02
- Added ability to translate JCM Console to other languages. Please contact Jetico Support if you would like to translate JCM Console to your native language.
- Fixed minor bugs.
05-March-2019 | server v.4.0.0 | client v.4.04.5 | agent 1.01.00
Security:
- Support for scrypt key derivation algorithm
- Enforcing strong encryption passwords
- Enforcing users to update their passwords
- Support for Camellia encryption algorithm
Performance:
- Encrypting existing data only
- Hardware acceleration for all algorithms
Transparent operation:
- Centralized management of Single Sign-On
- Support for TPM
Usability:
- User friendly names in Management Console
- BestCrypt Volume Encryption icon in system tray
- Revamped user interface