Welcome!

Open Source Cloud Authors: Elizabeth White, Liz McMillan, Pat Romanski, Yeshim Deniz, Zakia Bouachraoui

News Feed Item

TrueCrypt Alternative: BestCrypt By Jetico Welcomes Abandoned Users With Familiar UI and Published Source Code

In the wake of last week's discontinuation of TrueCrypt, data protection software developer Jetico welcomes TrueCrypt users with a painless, copy-paste migration to BestCrypt data encryption software. In addition, Jetico has published source codes to prove there are no backdoors or security vulnerabilities.

A feature comparison chart between TrueCrypt and BestCrypt, as well as download details, can be found at: **https://www.jetico.com/welcome-truecrypt-users-migrate-to-bestcrypt**

Jetico's BestCrypt encryption software is commercially maintained and is the industry's most reliable solution to support disk and file encryption of Windows 8 and UEFI computers. Pricing starts at $44.95 (with 25% discount for TrueCrypt users).

"Jetico's BestCrypt actually exceeds TrueCrypt's open source encryption software capabilities," says Michael Waksman, CEO of Jetico. "TrueCrypt was modeled after Jetico's encryption software, which we began developing in 1995, nearly a decade ahead of TrueCrypt's arrival. The similar 'volume' and 'container' structure has helped our business over the years as TrueCrypt users looking for more features and support have switched to Jetico's BestCrypt. Our commercially maintained software offers advanced features and is professionally updated – ensuring that you have reliable, ongoing data protection. If you like TrueCrypt, then you will love us!"

Transparent encryption, hidden or deniable encryption, container-level compatibility across Windows, Linux and Mac and user-friendly interface based on 'drag and drop', are all features of Jetico's TrueCrypt alternative. BestCrypt Container Encryption stores selected files and folders in virtual drives, while BestCrypt Volume Encryption is a more flexible alternative to full disk encryption, offering full support for RAID.

For anyone worried about backdoors hiding in commercial encryption software, Jetico has addressed that concern by opening the source codes of its encryption and key generation modules. Just visit the Support section on Jetico.com to download the BestCrypt Development Kit.

Compared to TrueCrypt, Jetico's BestCrypt offers added features and benefits, including:

  • Full support for Windows 8 and UEFI
  • Swap File encryption
  • Advanced deniable encryption, allowing several hidden containers
  • Keyboard Filter, Anti-Keylogger prevents password interception
  • Military-grade file wiping with BCWipe
  • Professional technical support
  • Ongoing software maintenance

About Jetico

Jetico provides military-standard data protection software for sensitive and mission-critical data throughout the lifecycle. Trusted for over 10 years by the U.S. Department of Defense, Jetico's BCWipe is for clearing files with surgical precision such as in response to classified data spills, while BCWipe Total WipeOut can erase hard drive data entirely such as for disposal or decommission. Jetico's BestCrypt protects the data you keep with strong encryption that’s easy to use. Enterprise Editions of Jetico software include Jetico Central Manager to empower Administrators with control of client software on remote computers.

Jetico products are trusted by government and military agencies, all of the top 10 U.S. defense contractors, many national laboratories, as well as various other enterprises and a wide global base of home and small business users in over 100 countries. Founded in 1995, Jetico is privately held and headquartered in the Otaniemi Science Park in Helsinki, Finland. For more information please visit jetico.com.

###

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
Recently, REAN Cloud built a digital concierge for a North Carolina hospital that had observed that most patient call button questions were repetitive. In addition, the paper-based process used to measure patient health metrics was laborious, not in real-time and sometimes error-prone. In their session at 21st Cloud Expo, Sean Finnerty, Executive Director, Practice Lead, Health Care & Life Science at REAN Cloud, and Dr. S.P.T. Krishnan, Principal Architect at REAN Cloud, discussed how they built...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...