Prevent Unauthorised Access to Sensitive Files and Directories



SecGo BestCrpt Pro is an easy-to-use file encryption application designed especially for business environments to prevent unauthorised access to sensitive material. Your information will always be encrypted yet available for an authorised  user just like with any other disk drive.




The software is based on virtual disk drives. Any disk on a workstation can host a virtual drive, where information is always encrypted. When the operating system or applications read the information off the virtual drive, only the required parts are decrypted. Similarly, when information is written on the disk, encryption is done on the fly. The virtual drive is visible to the workstation's users as an extra hard disk. All files saved on the disk are automatically encrypted – nothing more is needed.

Smart card based security

SecGo BestCrypt Pro allows multiple drives to be used simultaneously. The information content of the virtual drives is stored in a container on the hard drive. Just like normal drives, virtual drives can contain numerous files and folders. The contents of each virtual drive is protected with an encryption key which is generated onto a smart card.
To get access to encrypted data, the user needs a smart card and a PIN code. After initialising and assigning the encryption key, virtual drives are completely transparent to applications.

Closing the virtual drive makes access without the encryption key absolutely impossible. If necessary, in the case of a broken or stolen smart card, SecGo BestCrypt Pro supports non-mandatory key recovery. Virtual drives can also be protected by a plain password. It is possible to convert password protected containers to be protected by an encryption key or vice versa.

The contents of SecGo BestCrypt Pro virtual drives are encrypted with strong cryptographic methods. Several reliable algorithms are available, including 448-bit Blowfish, 256-bit Twofish and 256-bit GOST.

Key features
  • strong encryption
  • easy to use and install
  • completely transparent to applications
  • based on virtual disk drives
  • an encrypted virtual drive can reside on a hard drive, a network drive or a CD-ROM disk
  • fast: only the required pieces of information are decrypted when accessed
  • multiple simultaneous virtual drives
  • an independent encryption key for each virtual drive
  • smart card support