BestCrypt Base

TM
BestCrypt Base
Contact Jetico Enterprise Sales
Europe Tel. +358.92.517.3030
U.S. Tel. +1.202.742.2901
[email protected]
Innopoli 2
Tekniikantie 14
FI-02150 Espoo, Finland
www.jetico.com
Getting Started
BestCrypt Base - Encrypted for Compliance, Invisible to Users
> BestCrypt Base Overview
Key Benefits
• Safe data protection in case of theft
Trusted Data Protection:
• Compliance to avoid penalties and fines
> Transparent whole disk encryption
> AES in XTS mode with 256-bit key
• Easy and transparent for users (Client level)
• Minimal administration required
Trusted Client Management:
• Convenient, affordable solution
> HTTPS network communications
BestCrypt Base Architecture - Dedicated Hardware*
Office Network
BestCrypt Base
Protected by BestCrypt Base
Key Server
◄
TM
USB Stick:
Encrypted Key Storage
Console Computer:
Initial system setup, key server configuration, encryption keys backup, access and disk encryption control for clients.
Key Server:
Encryption keys storage, control over client computers via key distribution.
Client Computer:
Workstation data protected by whole disk encryption.
Protection made perfect.
1
TM
Innopoli 2
Tekniikantie 14
FI-02150 Espoo, Finland
www.jetico.com
Contact Jetico Enterprise Sales
Europe Tel. +358.92.517.3030
U.S. Tel. +1.202.742.2901
[email protected]
BestCrypt Base
TM
Getting Started
Setup Requirements - Dedicated Hardware*
1. Local Network
lll Moderate IT Skills
• Network settings are configured automatically
(typical setup via DHCP)
• Virtual Private Network (VPN) limitations:
• Turn off VPN during BestCrypt Base installation
• Client computers must be connected via LAN
• Dedicated router (recommended)
2. Key Server & Key Storage (USB Stick)
lll Advanced IT Skills
• Raspberry Pi (recommended, easiest, lowest cost)
• Model B (SD Card) or Model B+ (MicroSD Card)
• Micro USB power cord
• Network cable
• Low-cost PC (as an alternative to Raspberry Pi)
• USB & Network port
• No Operating System or hard drive required
• USB stick, 1 GB or more
3. Clients / Encrypted Computers
lll Easy
• Operating System: Windows XP or later
• Hardware: 15 MB disk space minimum
• Client computers must be connected via LAN
Installation Steps - Dedicated Hardware*
1. Install BestCrypt Base on Console Computer
lll Easy, 5-10 minutes
• Download software and start setup by double-clicking on icon
• Follow instuctions and complete process
2. Create Key Storage (USB Stick)
lll Moderate, about 10 minutes
• Launch BestCrypt Base application
• Follow wizard instructions
• Plug in dedicated USB stick when requested by wizard
Note: Dedicated USB stick
3. Set up Server
lll Moderate, about 10 minutes
Note: Dedicated Server Computer
4. Set up Clients
lll Easy, 10 minutes per Client + encryption time
•
•
•
•
Plug in USB stick and connect Network cable into Server
Prepare SD Card and plug it in (Raspberry Pi)
Set BIOS to boot from USB (Low-cost PC)
Start Server
• On Console computer, create installation disk (CD/DVD/USB)
for Client computers
Client menu > Client Software Installation Disk
• Install program on Client computer by using installation disk
• Re-boot Client computer - Encryption will start automatically
Technical Support
The Jetico development team is committed to satisfying our loyal customers by continuously perfecting our
software. We invite you to suggest any improvements or additions you would like to see in future versions.
To reach Jetico Technical Support, please contact us at [email protected].
©2015 Jetico Inc. Oy. All rights reserved.
BCWipe, BCWipe - Enterprise Edition, BCWipe Total WipeOut, BCWipe Total WipeOut - For Enterprises, BestCrypt Container Encryption,
BestCrypt Container Encryption - Enterprise Edition, BestCrypt Volume Encryption, BestCrypt Volume Encryption - Enterprise Edition,
BestCrypt Base and the Jetico logo are trademarks or registered trademarks of Jetico Inc. Oy.
All other product names mentioned herein are trademarks or registered trademarks of their respective owners.
Protection made perfect.
2