Protect Sensitive Data Even While in Use With New Tool From Jetico

BestCrypt Data Shelter Safeguards Folders from Unwanted Processes and Users

Jetico, long-trusted pioneer in data encryption, announced the release of BestCrypt Data Shelter, a new cybersecurity tool that’s integrated with all Jetico encryption products. Designed to protect files and folders even when they’re in use, Data Shelter builds on the data-at-rest capabilities of BestCrypt products and provides customers with an additional layer of security. BestCrypt Data Shelter is also available independently as freeware.

“Data is particularly vulnerable to cyberattacks when it’s in use. While our customers have relied on BestCrypt encryption to protect data-at-rest, we then wanted to address the issue of data security for files that are being viewed or modified,” says Jetico CEO Michael Waksman.

Marketing Technology News: Bluewater Media Bolsters Digital Team with Hire of Executive Kristy Andreadakis

“With the release of Data Shelter, our new cybersecurity tool, all BestCrypt users will gain additional protection to their data when it’s in an active accessible state.”

“With the release of Data Shelter, our new cybersecurity tool, all BestCrypt users will gain additional protection to their data when it’s in an active accessible state.”

BestCrypt Data Shelter provides protection against the rising number of cyberattacks by ensuring that folders on active computers can only be accessed by trusted programs and authorized users. The tool allows customers to create protection policies that are unique to selected folders, which helps to keep data safe and secure when it’s being used. Malware or ransomware may try to gain access to sensitive files by exploiting regular processes. Data Shelter can detect these harmful activities by monitoring communication between different processes – and keep your data safe from the storm.

Marketing Technology News: MarTech Interview with Gavin Laugenie, Global Head of Content at dotdigital

Highlights of BestCrypt Data Shelter:

  • Protect selected folders from unwanted programs and users
  • Create protection policies for any number of folders
  • Keep track of your encrypted drives and receive reminders about non-encrypted volumes
Brought to you by
For Sales, write to: contact@martechseries.com
Copyright © 2024 MarTech Series. All Rights Reserved.Privacy Policy
To repurpose or use any of the content or material on this and our sister sites, explicit written permission needs to be sought.