BestCrypt Container Encryption is a cross-platform (Windows, Mac, Linux, Android) solution that allows you to create encrypted storage (we call it container) and use it to store sensitive data inside. Once mounted (opened), such containers appear to the OS to be just like regular hard drives and can be easily accessed via Explorer / Finder. BestCrypt Container Encryption supports password-based encryption with a wide choice of secure encryption algorithms as well as public key encryption and secret-shared schemes  that require a number of passwords to be entered to open container. BestCrypt containers may be easily transferred between users and accessed for reading even without having BestCrypt necessarily installed (e.g. when abroad) with our small BCTraveller utility. BestCrypt Container Encryption also features creating hidden containers which was originally Jetico innovation for plausible deniability. BestCrypt Container Encryption includes  the add-on CryptoSwap  to encrypt system pagefile.


If you rather intend to encrypt and protect entire machine, another Jetico solution BestCrypt Volume Encryption would fit your needs. BestCrypt Volume Encryption is a powerful tool  that allows you to encrypt all kinds of all types of volumes and partitions including those residing on several disks (e.g. spanned, mirrored, stripped, RAID-5 and Storage Spaces). It also features pre-boot authentication, which means user must enter password, otherwise he won't be able to boot the machine. BestCrypt Volume Encryption is also capable of encrypting removable drives such as external harddrives, USB sticks, memory cards, etc.


This table may help you to choose the encryption type that fits your needs:



Advantages Disadvantages
Container Encryption


  •  it is safer to keep different kind of sensitive informationin in different containers; you won't lose everything if one container is damaged.
  •  it is more secure because every container has its own unique random encryption key. Maximum security will be achieved if you also use different passwords for them.
  • containers are mobile units, you can move or copy them to other computers, for example, to your laptop when you are going to a business trip. You can send them by email or upload to Internet.
  • when you open your files stored in containers with applications, some temporary files may be created on system drive. Also, some information can be stored in unencrypted form in system pagefile, hibernate file. 
Volume Encryption


  • for system volume: full security. All temporary files, swap file, hibernate file - everything is encrypted.
  • for dynamic volumes - all advantages of mirrored, striped, spanned, RAID volumes persist if this volume is encrypted.
  • data are encrypted 'in place'. You do not have to prepare free disk space as you do it for creating a container file.



  • once you enter the password and mount the encrypted volume or container - the data becomes opened and vulnerable to all kinds of external attacks, like unencrypted data. So, if you have encrypted entire computer, the data are opened during the whole Windows session, until you turn the computer off. With containers, you mount a container only when you need to work with these particular documents, and dismount it when you have done.