BestCrypt Volume Encryption software provides the following advanced functionality:
1. Encrypting all types of volumes residing on fixed and removable disks:
2. BestCrypt Volume Encryption allows encrypting data with many encryption algorithms known as strong algorithms. Every algorithm is implemented with the largest possible key size defined in the algorithm's specification:
3. BestCrypt Volume Encryption utilizes XTS Encryption Mode with all of the encryption algorithms listed above. XTS Mode is specially designed for applications working at the disk sector level. It is more secure than older modes (like Cipher Block Chaining (CBC) mode) and notably faster than LRW mode.
4. After installation, BestCrypt Volume Encryption can encrypt the boot volumes, as well as the system volumes (where Windows stores its system files, including Registry, Page files and Hibernate files). Initial encryption is transparent for both running applications and Windows system modules. Initial encryption can be paused and the user can continue the process at any time (for example after turning the computer off/on).
5. BestCrypt Volume Encryption performs Computer Pre-Boot Authentication if system or boot volume / partition is encrypted. It means that BestCrypt Volume Encryption is loaded before the operating system and allows computer to boot only after a proper password is entered.
6. BestCrypt Volume Encryption supports computers with operating systems loaded according to the Unified Extensible Firmware Interface (UEFI) between an operating system and platform firmware.
7. BestCrypt Volume Encryption provides an easy way to customize Pre-Boot Authentication texts that appear when the user is asked for password. The feature is intended for both providing a password hint and hiding the fact that pre-boot authentication process is running.
8. BestCrypt Volume Encryption supports hardware tokens SafeNet eToken and Yubikey devices as a secure hardware storage for encryption keys. With hardware tokens, the user gets two levels of protection for encrypted data: in addition to a password, it is necessary to connect small hardware token where encryption key is stored.
9. The software provides Two-Factor Authentication with regular removable disks (like USB sticks). In this case, the person who wants to access encrypted volume must: a) know password for the key; b) have the removable disk where the key is stored.
10. The software utilizes Trusted Platform Module (TPM) hardware available on many motherboards for the purpose of initiating an unattended reboot of computers with encrypted boot/system disk volumes. The feature is necessary to manage servers that are required to function around-the-clock. If such a server has an encrypted boot/system volume, every reboot of the server requires a manual password entry of password at boot. To solve this problem, the server administrator can set an interval of time when BestCrypt Volume Encryption (with the help of TPM) should support unattended reboot of the server.
11. BestCrypt Volume Encryption provides Secure Hibernating. If a user encrypts the volume where Windows stores its Hibernate File, BestCrypt Volume Encryption encrypts all write operations when Windows goes into Hibernate state and decrypts read operations when the computer wakes up. Since pre-boot authentication is necessary at wake-up, only the user who knows the proper password (and has hardware token, if used) can run a computer from Hibernate mode. Secure Hibernating is a functionality that must be implemented in such software as BestCrypt Volume Encryption, otherwise all data written at Hibernate time (together with encryption keys) appears on disk in opened decrypted form.
12. In addition to Hibernation Files, BestCrypt Volume Encryption encrypts Windows Crash Dump Files. Windows writes files in a very special way, because when a crash occurs, regular disk write operations cannot be used. Without encrypting Crash Dump Files, the security level of the software is significantly lowered, because the files can store a snapshot of memory together with encryption keys in an open, decrypted form.
13. BestCrypt Volume Encryption supports a number of rescue functions allowing the user to decrypt volumes if a serious disk crash should occur.