Jetico Central Manager

Take command of all disk encryption activities with Jetico Central Manager

Jetico Central Manager (JCM), included as a component in BestCrypt Volume Encryption – Enterprise Edition, enables a single person (Administrator) from a central administration computer to always monitor usage of encrypted data on remote workstations across an enterprise network. It also includes a database for gathering and storing information from client computers, such as log information about deployment and updates of BestCrypt Volume Encryption client modules or rescue information to recover encrypted data in case of emergency.

To learn more about JCM or require a free trial, contact us!



  • Deploy with ease
    - Connect client computers to the server and add them to the database automatically by simply running one executable file
    - Support for deployment automation using Windows Group Policy or third-party utilities (e.g., Microsoft SCCM, LANDesk)


  • Control encryption activities over HTTPS from anywhere – now with any device with a web-browser, including smartphones and tablets (NEW in JCM v.3)
  • Manage encryption on any remote computers including those outside your corporate network as long as it has internet connection (NEW in JCM v.3)
  • Central management of encryption policy distribution 
    - Gain peace of mind with pre-set encryption policies based on compliance requirements, including HIPAA and GDPR (NEW in JCM v.3)
    - Create and save customized encryption policies to best match their company standards (NEW in JCM 3)
    - On client side, end-user only needs to enter/set password to initiate encryption as configured by Administrator in JCM
  • Control user access to encryption/decryption of disk volumes
    - Admins can now decide whether to allow users to ‘Manage Encryption Locally’ or force their computers to abide by a central policy
  • Centralized security policies for removable drives
    - Encrypt removable drives, such as USB sticks, and set individual security policies for non-encrypted removable drives to be read-only or forbidden entirely


  • Monitor usage of encrypted disk partitions/volumes and gather information from client computers in a central JCM database
    - Get instant alerts about any problems and see the progress of encryption tasks in real time (NEW in JCM v.3)
  • Centralized logging
    - Get detailed logs of selected computers or a group of computers - including full list of changes and instantly view warnings/errors (NEW in JCM v.3)
  • Create global reports in HTML or PDF format
    - Run and retrieve encryption reports for auditing purposes, including comprehensive information about:
    Active accounts;
    Status and number of licenses;
    Status and number of managed endpoints;
    Account activity logs.
    See sample (NEW in JCM v.3)
  • Review audit logs to trace back configuration changes made by a selected account or all accounts with complete and precise activity reporting (NEW in JCM v.3)

Task Automation

  • Automatically acquire the latest recovery information from client computers in JCM Database to allow security administrators to recover encrypted client data in case of emergency or forgotten password
  • Set automatic updates of both client software and Jetico Central Manager Database
    - Schedule automatic updates (NEW in JCM v.3)
  • Automatic backup of Jetico Central Manager Database


  • Protected network traffic between client computers and a server by using public/private key technology with HTTPS protocol (NEW in JCM v.3)
  • Encryption of sensitive information in Jetico Central Manager Database
  • Protect endpoints with the strongest encryption algorithms recognized worldwide
    - Support for AES encryption algorithm
    - Support for RC6, Twofish or Serpent encryption algorithms (NEW in JCM v.3)

MSPs & Bigger Enterprises

  • Support for server clustering (NEW in JCM v.3)
  • Support for multiple accounts and role-based access control to share responsibilities between multiple personnel and assign access to Jetico Central Manager Console based on role (Administrator, Operator, Auditor) (NEW in JCM v.3)
  • Support for MSPs to manage multiple companies from one database and a single console, including separate licensing, software and/or encryption policies (NEW in JCM v.3)
Language version



If you would like to translate BestCrypt Container Encryption client software into your native language, contact Jetico Technical Support.

Gear showing technical features of the product
System Requirements

Windows 10
Windows 8.x
Windows 7
Windows Vista
Windows Server 2016
Windows Server 2012 and 2012 R2
Windows Server 2008 R2 SP1

(32-bit and 64-bit versions)