TM BestCrypt Base Contact Jetico Enterprise Sales Europe Tel. +358.92.517.3030 U.S. Tel. +1.202.742.2901 [email protected] Innopoli 2 Tekniikantie 14 FI-02150 Espoo, Finland www.jetico.com Getting Started BestCrypt Base - Encrypted for Compliance, Invisible to Users > BestCrypt Base Overview Key Benefits • Safe data protection in case of theft Trusted Data Protection: • Compliance to avoid penalties and fines > Transparent whole disk encryption > AES in XTS mode with 256-bit key • Easy and transparent for users (Client level) • Minimal administration required Trusted Client Management: • Convenient, affordable solution > HTTPS network communications BestCrypt Base Architecture - Dedicated Hardware* Office Network BestCrypt Base Protected by BestCrypt Base Key Server ◄ TM USB Stick: Encrypted Key Storage Console Computer: Initial system setup, key server configuration, encryption keys backup, access and disk encryption control for clients. Key Server: Encryption keys storage, control over client computers via key distribution. Client Computer: Workstation data protected by whole disk encryption. Protection made perfect. 1 TM Innopoli 2 Tekniikantie 14 FI-02150 Espoo, Finland www.jetico.com Contact Jetico Enterprise Sales Europe Tel. +358.92.517.3030 U.S. Tel. +1.202.742.2901 [email protected] BestCrypt Base TM Getting Started Setup Requirements - Dedicated Hardware* 1. Local Network lll Moderate IT Skills • Network settings are configured automatically (typical setup via DHCP) • Virtual Private Network (VPN) limitations: • Turn off VPN during BestCrypt Base installation • Client computers must be connected via LAN • Dedicated router (recommended) 2. Key Server & Key Storage (USB Stick) lll Advanced IT Skills • Raspberry Pi (recommended, easiest, lowest cost) • Model B (SD Card) or Model B+ (MicroSD Card) • Micro USB power cord • Network cable • Low-cost PC (as an alternative to Raspberry Pi) • USB & Network port • No Operating System or hard drive required • USB stick, 1 GB or more 3. Clients / Encrypted Computers lll Easy • Operating System: Windows XP or later • Hardware: 15 MB disk space minimum • Client computers must be connected via LAN Installation Steps - Dedicated Hardware* 1. Install BestCrypt Base on Console Computer lll Easy, 5-10 minutes • Download software and start setup by double-clicking on icon • Follow instuctions and complete process 2. Create Key Storage (USB Stick) lll Moderate, about 10 minutes • Launch BestCrypt Base application • Follow wizard instructions • Plug in dedicated USB stick when requested by wizard Note: Dedicated USB stick 3. Set up Server lll Moderate, about 10 minutes Note: Dedicated Server Computer 4. Set up Clients lll Easy, 10 minutes per Client + encryption time • • • • Plug in USB stick and connect Network cable into Server Prepare SD Card and plug it in (Raspberry Pi) Set BIOS to boot from USB (Low-cost PC) Start Server • On Console computer, create installation disk (CD/DVD/USB) for Client computers Client menu > Client Software Installation Disk • Install program on Client computer by using installation disk • Re-boot Client computer - Encryption will start automatically Technical Support The Jetico development team is committed to satisfying our loyal customers by continuously perfecting our software. We invite you to suggest any improvements or additions you would like to see in future versions. To reach Jetico Technical Support, please contact us at [email protected]. ©2015 Jetico Inc. Oy. All rights reserved. BCWipe, BCWipe - Enterprise Edition, BCWipe Total WipeOut, BCWipe Total WipeOut - For Enterprises, BestCrypt Container Encryption, BestCrypt Container Encryption - Enterprise Edition, BestCrypt Volume Encryption, BestCrypt Volume Encryption - Enterprise Edition, BestCrypt Base and the Jetico logo are trademarks or registered trademarks of Jetico Inc. Oy. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. Protection made perfect. 2
© Copyright 2026 Paperzz