BestCrypt Container Encryption 9.03.18

To protect your privacy, comply with regulations and prevent data breaches, BestCrypt Container Encryption delivers 'on-the-fly' data encryption that's easy to use for virtual drives and selected files or folders. BestCrypt encrypts files on Windows, Mac OS X and Linux with AES and other strong encryption algorithms. By featuring deniable encryption and dynamic containers Jetico's file encryption is the best TrueCrypt alternative. Includes BCWipe

BestCrypt Volume Encryption 4.05.1

BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.

BestCrypt Volume Encryption 4.05.1

BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.

BestCrypt Volume Encryption 4.05.1

BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.

BestCrypt Volume Encryption 4.05.1

BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.

BestCrypt Volume Encryption 4.05.1

BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.

BestCrypt Volume Encryption 4.05.1

BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.

BestCrypt Volume Encryption 4.05.1

BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.

BestCrypt Volume Encryption 4.05.1

BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.

BestCrypt Volume Encryption 4.05.1

BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.

Secure Doc 2.1.0.1

The 'Secure Doc' product converts general documents to secure documents. This secure document can have policies such as expiration date and expiration count, output control, clip copy control, and so on. Administrators can also control this secure document remotely to prevent users from opening the document, and all usgae logs are collected on the server. Secure documents can be opened on Windows, MAC, Android, iPhone.

Secure Doc 2.1.0.1

The 'Secure Doc' product converts general documents to secure documents. This secure document can have policies such as expiration date and expiration count, output control, clip copy control, and so on. Administrators can also control this secure document remotely to prevent users from opening the document, and all usgae logs are collected on the server. Secure documents can be opened on Windows, MAC, Android, iPhone.

Secure Doc 2.1.0.1

The 'Secure Doc' product converts general documents to secure documents. This secure document can have policies such as expiration date and expiration count, output control, clip copy control, and so on. Administrators can also control this secure document remotely to prevent users from opening the document, and all usgae logs are collected on the server. Secure documents can be opened on Windows, MAC, Android, iPhone.

Secure Doc 2.1.0.1

The 'Secure Doc' product converts general documents to secure documents. This secure document can have policies such as expiration date and expiration count, output control, clip copy control, and so on. Administrators can also control this secure document remotely to prevent users from opening the document, and all usgae logs are collected on the server. Secure documents can be opened on Windows, MAC, Android, iPhone.

Secure Doc 2.1.0.1

The 'Secure Doc' product converts general documents to secure documents. This secure document can have policies such as expiration date and expiration count, output control, clip copy control, and so on. Administrators can also control this secure document remotely to prevent users from opening the document, and all usgae logs are collected on the server. Secure documents can be opened on Windows, MAC, Android, iPhone.

Secure Doc 2.1.0.1

The 'Secure Doc' product converts general documents to secure documents. This secure document can have policies such as expiration date and expiration count, output control, clip copy control, and so on. Administrators can also control this secure document remotely to prevent users from opening the document, and all usgae logs are collected on the server. Secure documents can be opened on Windows, MAC, Android, iPhone.

Secure Doc 2.1.0.1

The 'Secure Doc' product converts general documents to secure documents. This secure document can have policies such as expiration date and expiration count, output control, clip copy control, and so on. Administrators can also control this secure document remotely to prevent users from opening the document, and all usgae logs are collected on the server. Secure documents can be opened on Windows, MAC, Android, iPhone.

Secure Doc 2.1.0.1

The 'Secure Doc' product converts general documents to secure documents. This secure document can have policies such as expiration date and expiration count, output control, clip copy control, and so on. Administrators can also control this secure document remotely to prevent users from opening the document, and all usgae logs are collected on the server. Secure documents can be opened on Windows, MAC, Android, iPhone.

Secure Doc 2.1.0.1

The 'Secure Doc' product converts general documents to secure documents. This secure document can have policies such as expiration date and expiration count, output control, clip copy control, and so on. Administrators can also control this secure document remotely to prevent users from opening the document, and all usgae logs are collected on the server. Secure documents can be opened on Windows, MAC, Android, iPhone.

File Protect System 3.2.1.4

File Protect System (FPS) is a professional solution for the personal data protection. The application can be used alone to encrypt files and folders, or as a component of a complete cyber defense system. FPS allows you to build a reliable confidential information exchange system using embedded e-mail client.

VyprVPN for Mac 2.20.0.670

The VyprVPN for Mac application automatically configures and simplifies managing your VPN connections. Switch freely between 40+ global server locations and multiple VPN protocols with a single click. The VyprVPN app features a sleek and intuitive look and feel, with powerful new features and customization options. VyprVPN is a free VPN service. VyprVPN also has Wndows, iOS and Android apps. Learn more: www.goldenfrog.com/vyprvpn

VyprVPN for Mac 2.20.0.670

The VyprVPN for Mac application automatically configures and simplifies managing your VPN connections. Switch freely between 40+ global server locations and multiple VPN protocols with a single click. The VyprVPN app features a sleek and intuitive look and feel, with powerful new features and customization options. VyprVPN is a free VPN service. VyprVPN also has Wndows, iOS and Android apps. Learn more: www.goldenfrog.com/vyprvpn

VyprVPN for Mac 2.20.0.670

The VyprVPN for Mac application automatically configures and simplifies managing your VPN connections. Switch freely between 40+ global server locations and multiple VPN protocols with a single click. The VyprVPN app features a sleek and intuitive look and feel, with powerful new features and customization options. VyprVPN is a free VPN service. VyprVPN also has Wndows, iOS and Android apps. Learn more: www.goldenfrog.com/vyprvpn

VyprVPN for Mac 2.20.0.670

The VyprVPN for Mac application automatically configures and simplifies managing your VPN connections. Switch freely between 40+ global server locations and multiple VPN protocols with a single click. The VyprVPN app features a sleek and intuitive look and feel, with powerful new features and customization options. VyprVPN is a free VPN service. VyprVPN also has Wndows, iOS and Android apps. Learn more: www.goldenfrog.com/vyprvpn

VyprVPN for Mac 2.20.0.670

The VyprVPN for Mac application automatically configures and simplifies managing your VPN connections. Switch freely between 40+ global server locations and multiple VPN protocols with a single click. The VyprVPN app features a sleek and intuitive look and feel, with powerful new features and customization options. VyprVPN is a free VPN service. VyprVPN also has Wndows, iOS and Android apps. Learn more: www.goldenfrog.com/vyprvpn

Page 3 of 88       1 24 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20