Write a Review
Unclaimed Profile
Creates a virtual encrypted disk within a file and mounts it as a real disk. Encrypts an entire partition or storage device such as USB flash drive or hard drive. Encrypts a partition or drive where Windows is installed (pre-boot authentication). Encryption is automatic, real-time(on-the-fly) and transparent. Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted. Encryption can be hardware-accelerated on modern processors. Provides plausible deniability, in case an adversary forces you to reveal the password: Hidden volume (steganography) and hidden operating system.
- Computer-network-security
- Computer-software
- Information-technology-services
- English
Screenshot & Video
LICENSING & DEPLOYMENT
- Open Source
- Cloud Hosted
- On Premises
- Web-based
- Windows
- Mac
- Linux
SUPPORT
- Email
- 24x7 Support
Knowledge Base
- Help Guide
VeraCrypt Core Features
- Strong Encryption Algorithms
- File and Disk Encryption
- Secure Key Management
- User Authentication and Access Control
- Encryption of Data in Transit
- Transparent Encryption
- Data Integrity & Authenticity Checks
- Cross-Platform Compatibility
- Secure Backup & Restore
- Integration with Existing Systems
- Audit Logs & Activity Monitoring
- Data Loss Prevention (DLP)
- Compliance with Regulations
- Secure Deletion
- Zero-Knowledge Architecture
VeraCrypt Pricing
Pricing Type
-
Free
VeraCrypt Reviews
This profile is not claimed
Do you own or represent this business? Enter your business email to claim your GoodFirms profile.