Specials
News Show all news...

DriveCrypt 1344-Bit - Disk Encryption


DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this disk encryption product.

DriveCrypt Disk Encryption

DriveCrypt
  • Encrypts containers / partitions and external devices
  • 1344 Bit ultra-strong encryption
  • Hides data in fake disks or music files
  • Encrypts any kind of devices (external disk, CDS, DVD, and USB sticks)

instead of 69.95 €    only 39.95 €

Supported operating systems:

  • 32 and 64 bit Windows:
  • Windows 10
  • Win 7 / Win 8.x
  • Server (2003/2008/2012)

Screenshots:

How DriveCrypt`s On-the-fly Encryption Works

As data is read from the hard disk, DRIVECRYPT automatically decrypts the data before it is loaded into memory. When data is written back to the hard disk, it is automatically re-encrypted. The disk encryption/decryption process is completely transparent to the user or any application program because the data is processed by an operating system extension, "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt or re-encrypt their data, or change the normal operation of the PC. In addition, only individual files are decrypted at any one time, not the whole hard disk.

DriveCrypt main features

1. Strong Cryptography

1344 Bit Military Strength disk encryption using the best and most proven cryptographic algorithms such as AES, Blowfish, Tea 16, Tea 32, Des, Triple Des, Misty 1 and Square.

2. Easy to Install, Deploy & Use

DRIVECRYPT data encryption software requires minimal administration and user training. Disk encryption is completely transparent, requiring no change in the way users work with the computer.

3. Maximize Your Security, Minimize Your Risk

DRIVECRYPT protects your data with very fast and a true "on the fly" disk encryption process. Some other products that claim to be "on the fly" decrypt an entire file and load it into memory, creating significant security risks. DriveCrypt file encryption software is smarter and more secure because it decrypts only the specific portion of a file that is in use. Unprotected data never resides on a DriveCrypt encrypted hard drive.

4. Disk Partition and file volume encryption

DRIVECRYPT allows both, the encryption of an entire Hard Disk partition, as well as the creation of a virtual container file that will store all the encrypted information.

5. Invisible Containers

The DriveCrypt Standard edition has the ability to create an INVISIBLE disk INSIDE a container or partition. This way you define two passwords for a container. The invisible disks password gives you access to your working disk, which is hidden in the unused area of your "outer" disk, while another password gives you access to the pre-setup DriveCrypt volume in which you only store data that you would want others to believe is the only data in the container or partition. This is very useful in cases where adversaries may force you to reveal the DriveCrypt disk's password: By revealing the password of the first or "outer" disk, the adversary will ONLY see the "prepared data": IE data you put in there, before creating the hidden disk, while he will not be able to see or get evidence that there is another invisible container that securely stores confidential data on the disk.

6. Hide data into music files

Using special so called "Steganographic" functionalities, DRIVECRYPT allows you to hide all your sensitive information into music files. Just authorized users will be able to access secret information, anyone else will only find harmless music on the computer…

7. Easily encrypts Pen-Drives and USB disks on a container or partition level.

With the HOT Disk option, DriveCrypt can also optionally automatically request the users authentication data as soon as the USB device is inserted. When the USB disk is removed from the computer, all the data are automatically inaccessible to unauthorized persons.

8. Improved Password Security

DRIVECRYPT allows administrators to configure several password settings:

  • Master Password Settings
  • Restricted second user Passwords
  • Second user Password Expiration
  • Console Lock-Out Password
9. Password Sniffing Protection

DRIVECRYPT integrates special functions that prevent passwords from being sniffed by hackers or trojan horses such as Back Orifice, SubSeven etc...

10. No-Evidence Encryption

DRIVECRYPT container files do not have any file header that indicates it is a DriveCrypt encrypted file. Therefore, without knowing the right passphrase, it is impossible to prove that a large container file on the computer is a DriveCrypt virtual disk container.

11. Administrator Password Control (keyfiles)

DRIVECRYPT allows system Administrators to assign different passwords to different users.

12. Anti Dictionary or Brute Force Attack mechanism

DRIVECRYPT makes Dictionary or Brute Force attacks against encrypted volumes much harder than any of the actual competitor products by dramatically slowing down these processes.

13. Easy and fast hotkey control

DRIVECRYPT allows the most used commands like mount or dismount encrypted volumes… to be rapidly accessed through Hotkeys and/or the toolbar.

14. Second User Access

DRIVECRYPT allows the creation of a master password, as well as different lower rights second user passwords (keyfiles).

15. Forgotten user password recovery

DRIVECRYPT allows administrators using the master password, to access an encrypted disk even if the user has forgotten his user password. This ensures that a company can restore a user password if forgotten. DriveCrypt prevents loss of valuable data from user's workstations and notebooks by allowing three methods of encrypted data access: the Master Password, the user password (keyfile) and/or hardware device access such as optional fingerprint/Smartcard Readers or USB Token devices.

16. Eliminate the Danger Of Unattended Computers

DRIVECRYPT provides an automatic and/or manual lock-out feature that locks out the user's console and displays a password-protected screen saver. This lock-out functionality can be activated manually or automatically after a specified period of computer inactivity. The computer remains secure even when left unattended. To restore the screen and unlock the keyboard, the password for the current user or Master Password must be entered.

17. Secure Disk Deletion (Disk Wiping)

DRIVECRYPT allows you to wipe the free space on a disk. This ensures that deleted files will never be recovered by special disk tools.

18. Encrypted Volume Resizing (DriveCrypt Standard edition)

An Encrypted Volume may, with time, become too small or too big, for the amount of data it has to contain. Therefore, DriveCrypt offers you a Volume-Resize functionality. This will allow you to easily adapt a volume to your needs at any time, and optimise the Hard Disk space.

19. External Hardware Support

DRIVECRYPT supports optional external hardware devices such as: Fingerprint and Smartcard reader, as well as USB token.

20. Works on any Storage Medium

DRIVECRYPT works on any kind of Hard Disk, and removable medium such as Floppy-, Zip-, Jazz-, Sygate-, CD-Rom, DVD- Drives etc… and manages up to 16 TERABYTES of encrypted data (Standard edition) or 4 GB (Home Edition)

21. Installation is Easy and Safe

The installation is easy and fast. During installation, the administrator simply selects the drives to be encrypted, the encryption method he would like to use and the master password. DRIVECRYPT will then make the rest and crypt the selected disks.

22. Encrypted Data is Easily Recovered

If a user leaves the organization, the encrypted data on the PC is easily recovered and restored to a decrypted state by the administrator using the Master Password or the Local Administrator Password.

23. No Backdoors present

DriveCrypt does NOT include any backdoor. Encrypted data are only accessible by the legitimate users. Neither the vendor nor any other entities are able to break DriveCrypt disk encryption.

FAQ

Show all...

  1. What is the maximum size for container and partitions?

On Windows 7 onwards (as well as some now unsupported earlier versions) file containers as well as partitions have virtually unlimted size up to the size supported by the NTFS filesystem.  

 

  1. Is your new software compatible with the old versions?

The new version is also backwards compatible, so you will still be able to mount container and partitions created with previous DriveCrypt 4.6 versions and above

  1. Can I mount container and partitions created with the full DriveCrypt version using the demo version?

No

  1. What feature are disabled in the demo version?

- formatting partitions as DriveCrypt

- traveller mode

- invisible disk creation

  1. Can I upgrade from DriveCrypt to DriveCrypt Plus Pack?

No, DriveCrypt and DriveCrypt Plus Pack are two different softwares that have no relation to each other and that work completely different.

 

  1. Can I encrypt GPT drives using DriveCrypt?

Yes, you can encrypt GPT drives with the software

  1. Can I access encrypted external drives on another PC that doesn’t have DriveCrypt installed?

You can access your external drives that store container using traveller mode.

Encrypted partitions can only be accessed from a PC with a full DriveCrypt version.

 

  1. How can I upgrade my DriveCrypt version?

If you have valid upgrade rights, you can upgrade your version by doing the following:

-uninstalling DriveCrypt and resetting your license

-installing new DriveCrypt version and re-registering the software

*In order to verify if upgrade rights exist, you need to login to your customer area (https://www.securstar.com/en/customer-area.html).

Select “Key Generator”, chose your product by clicking on the radio button.

You can then view which version you are allowed to register and the date of when the service expires/expired.

 

 

  1. Has the DriveCrypt encryption ever been broken/hacked?


No! In the past, we have also launched several contests offering up to 100,000 US$ for the first person able to open a DriveCrypt encrypted disk
Nobody succeeded!

10.  We are from the "Police" "Tax authority" "Security Company". and are investigating on someone whose computer is protected with your DriveCrypt software. Since we were not able to break into the protected computer ourselves, could you please assist us getting access to the encrypted data? If requested, we can provide you with a court order.


Sorry, but our software has been designed to be the most secure in the industry, and as such not even our programmers are able to break into a DriveCrypt encrypted computer.
The only way to get access to the protected data is by entering the correct password known only by the legitimate user.

11.  Is there a back door in your software?


No. There is no back door in our software, and there is no point in making one as we might risk losing the good reputation of our products. Besides this, today there is no law in Germany that can force us to make one in our software.

12.  Have you ever been asked by any government to add a "back door" to your software?

We have never been asked by any government to add a back door into our software, and we have no interest in making one. In any case, no country in the world, other than Germany (where SecurStar is incorporated), can force us to put a back door in our software. Please note that we incorporated SecurStar in Germany, because Germany is one of the few governments in the world that actively promotes strong cryptography while other countries are more restrictive on this subject matter. If laws in Germany should change in the future, we are prepared to move the company accordingly.

13.  Is the source code of your software available?

With our former products Scramdisk and E4M we had a long tradition of open source software. With these products, millions of people all over the world could verify the software security and review how the encryption functions. Unfortunately our competitors had nothing better to do but to steal our source code to add routines and functionalities to their (closed source) products. Some also just cloned our software and only changed the user interface.
Since we want to avoid spending a tremendous amount of money and time in research and development to see competitors stealing our work, we decided to release the source code only to selected customers after they placed a substantial order and signed a non-disclosure agreement.
We are open to other ways of releasing the source code to the public, but need to find a solution that can also protect our interests. One idea we had was to release a basic version of our software together with its source code. This way, the most paranoid can use that software to encrypt/ decrypt the data. Please let us know if this would be acceptable for you, or if you have any other interesting idea that covers the above problematic. We would be more than happy to listen to you. Please write to contact@securstar.de



14. On what OS can DriveCrypt be installed on?

You can install the software on Windows 7/8.x/10 both 32 and 64 bit, as well as on Server 2003/2008/2012

 



Windows 2003/2008/2012/ 7/8.x/10 are Registered Trademarks of Microsoft, Inc.
All trademarks are property of their respective owners.