Password must be long and random enough, so it is very convenient to use 'Password Manager' programs for generating and storing long and random passwords. However, there are several drawbacks here.
1. As you know, there are 'password-guessing' modules that perform dictionary or brute-force attack on any password-based encryption software. Certainly, if you use good password for your password storage, it is difficult to guess it. However, if such accident happens, the hacker will get access to ALL your other passwords at once.
2. By design of BestCrypt, a password exists in memory only for a very short time - it is erased from memory just after generation of hash value. As for key storage programs, we do not know how it is implemented and we are not responsible for other software. When you have your password storage opened, can you be sure that the generated and stored passwords do not exist in memory or in the pagefile? The careful analysis of each utility separately is needed.
3. What about reliability of encryption used for storing the passwords on the disk? Again, it is necessary to investigate the matter for each utility.
4. If the program has an opportunity to put a password into the appropriate software (BestCrypt or other) automatically, then it is very likely that there is a possibility to catch the password during the transmission. If it has not such opportunity, it is very likely that you will use Windows Clipboard for entering the password and this is not recommended either, in the context of security. The best level of security is achieved if you enter the password to the password edit box directly from the keyboard and BestCrypt Anti-keylogger is turned ON.
Generally, if you use BestCrypt in conjunction with a Password Manager, the level of security becomes equal to the level of security of the Password Manager program.