1. Centralized deployment.
    Automatically add computers to database by running one executable file. Compatible with deployment automation solutions like Microsoft SCCM, LANDesk, etc.
  2. Encryption policies.
    Combine variety of encryption settings into one Encryption Policy. Create and save encryption policies for easier distribution of custom encryption settings or use a number of pre-configured policies offered by Jetico. Assign policies to computer groups or selected computers.
  3. Enforcing strong encryption passwords.
    Encryption administrators can now choose to only allow encryption passwords that score as Strong according to Zxcvbn password strength checker.
  4. Various encryption algorithms.
    Select one of the four featured encryption algorithms that complies best with your company standards.
  5. Support for scrypt key derivation algorithm.
    BestCrypt Volume Encryption Enterprise Edition now uses scrypt algorithm to derive key from password.
  6. Support for Camellia and ARIA encryption algorithms.
    Widely recognized and time-proven Japanese encryption algorithm Camellia and gaining worldwide recognition South-Korean cipher ARIA become the fifth and the sixth encryption standards offered in BestCrypt Volume Encryption Enterprise Edition for encrypting hard drives and removable media.
  7. Encrypting existing data only.
    Encryption compliance can now be achieved in less time with the option to skip the free space and to only process the space occupied by files when encrypting hard drives and removable media
  8. Hardware acceleration for all algorithms.
    New version takes advantage of the extended instruction set extending the benefits of hardware acceleration to Serpent, Camellia and Twofish in addition to AES. The software will automatically use the most superior option supported by given processor providing best operation with no noticeable performance impact.
  9. Centralized management of Single Sign-On.
    Single Sign-On allows for automatic enrollment into Windows after entering boot-time encryption password. Encryption administrators can now allow or disallow the use of Single Sign-On as part of encryption policy.
  10. Integration with Active Directory for Single-Sign-On.
    Administrators can now configure Jetico Central Manager to use Microsoft Active Directory user credentials as authentication method on encrypted endpoints. This eliminates the need to memorize additional passwords and allows for uninterrupted user lifecycle management in existing enterprise environments.
  11. Support for TPM.
    The new version allows taking advantage of TPM hardware installed on encrypted endpoints as part of extended Suspend Protection options. Encryption administrators can additionally specify a number of times or exact hours when subject computer can restart with the use of TPM instead of authentication.
  12. BestCrypt Volume Encryption icon is system tray.
    A useful shortcut to quickly mounting or dismounting encrypted disks now available in system tray area on encrypted endpoints
  13. Integration with Windows Recovery Environment. 
    Administrators can choose to automatically install BestCrypt Volume Encryption modules into Windows Recovery Environment during deployment. This will allow for 
  14. Revamped user interface.
    The new version of BestCrypt Volume Encryption client software was getting a new look and feel for even better user experience.

See also:

Central Management of BestCrypt Volume Encryption

Rescue Procedures in Jetico Central Manager

JCM Management Console: Company Page

Encryption Policies