BestCrypt Container Encryption for Windows All Features

Scroll down to learn more about each BestCrypt Container Encryption for Windows feature.

Thank you for contacting Jetico!
We will respond to you as soon as possible.

Send us a message - we'll reply within 24 business hours.

Need help now? Call
US: 202 742 2901 EU: +358 9 2517 3030

General Features

Store & Access Encrypted Files Easily via Virtual Drives
Encrypted virtual drives are visible as regular disks. Encryption/decryption is totally transparent for applications. Check out the 5 Benefits of Using Container Encryption vs. File Encryption.

Create & Manage Multiple Containers
Number of containers is not limited. Size of container is limited by the partition size.

Move & Store Encrypted Containers Across Windows, Linux, Mac & Android

Upload & Share Containers in Cloud

Go beyond password protection, use BestCrypt in the cloud to upload and share your files with real security. Encrypted containers can be accessed on Windows, Linux, Mac and Android operating systems. Step-by-step instructions

Mount Encrypted Drive as a Subfolder
In addition to usual drive letters, BestCrypt can mount encrypted drives as a subfolder of NTFS folder. So you are not limited by the number of free drive letters.

Define Usage in Multi-user Environment
BestCrypt containers can be mounted for the current user only, or for all users. Containers mounted for all users can be shared in the network for a group of users. BestCrypt can work in Terminal Service environment. BestCrypt remembers shared information, so that administrator does not need to share the folders again after each mounting.

Create & Access Containers Instantly
With BestCrypt users can start adding files immediately with instant access to encrypted containers. The BestCrypt container will finish encrypting in the background while users work with their sensitive information.

Work with Dynamic Containers
Dynamic Containers allow your encrypted storage to expand as you go - maximum size is set at time of container creation, while actual container size grows as files are added. For optimized stability and to prevent system crashes and data loss, Dynamic Containers feature Smart Free Space Monitoring technology. Jetico's unique innovation monitors system parameters and constantly indicates the amount of data that can be written to Dynamic Containers.

Security Enhancement

Enhanced Hidden Containers
BestCrypt supports one or more hidden containers inside outer container. It is impossible to define whether a shell container is concealing a hidden container or not. Watch how to create Hidden Containers

Operations with Container Headers
Container's header can be (optionally) encrypted. It can be backed up and stored separately as a small file. The original header inside container can be wiped, that allows preventing password-guessing attack.

Support for Strong Encryption Algorithms
BestCrypt Container Encryption utilizes a robust variety of strong encryption algorithms:

  • AES
  • Blowfish
  • CAST
  • GOST 28147-89
  • Twofish
  • Camellia

Each algorithm is implemented with the largest possible key size defined in the algorithm's specification. In addition to CBC and LRW encryption modes, BestCrypt utilizes the most secure XTS encryption mode.

Support for Keyfiles
Users can add another level of authentication on top of standard password protection - a much beloved and missed feature of now-defunct TrueCrypt.

Prevent Accidental Deletion of Containers with Container Guard
Container Guard protects your containers from being accidentally deleted or moved to another location by an unauthorized user.

This low-level module, once it is turned on, works in the background when the user enters password in BestCrypt password box. Keyboard Filter prevents keyboard monitor utilities (keyloggers) from intercepting a real password that the user types.

Support for Public Key Encryption
The software supports key pairs in standard formats PKCS #12, X.509 and PGP keys. Encrypt container with public key of other person to allow him/her to access data inside the container. Watch how to use Public Key Encryption

Support for Secret Sharing Schemes
This functionality allows a group of persons to share a single encrypted container so that only selected members of the group will be able to open the container. Watch how to use Secret Sharing Schemes


Wipe Files & Folders Beyond Forensic Recovery with BCWipe

Compress One or More Files in an Encrypted Archive with BCArchive

Encode/Decode Text Data with BCTextEncoder

Encrypt Windows Swap File