<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>best drive encryption Archives - Reactual</title>
	<atom:link href="https://reactual.com/tag/best-drive-encryption/feed" rel="self" type="application/rss+xml" />
	<link>https://reactual.com/tag/best-drive-encryption</link>
	<description>Useful Tools and Products</description>
	<lastBuildDate>Tue, 22 Nov 2011 11:39:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://reactual.com/wp-content/uploads/2022/10/cropped-D5LAqfLWwAIaiJG-1-32x32.jpeg</url>
	<title>best drive encryption Archives - Reactual</title>
	<link>https://reactual.com/tag/best-drive-encryption</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Best Drive Encryption Solutions For Macs</title>
		<link>https://reactual.com/software/drive-encryption-solutions-macs.html</link>
					<comments>https://reactual.com/software/drive-encryption-solutions-macs.html#respond</comments>
		
		<dc:creator><![CDATA[Justin Thomas]]></dc:creator>
		<pubDate>Fri, 29 Jul 2011 20:36:52 +0000</pubDate>
				<category><![CDATA[Software]]></category>
		<category><![CDATA[actually]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[ars technica]]></category>
		<category><![CDATA[best drive encryption]]></category>
		<category><![CDATA[best mac encryption]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[choice]]></category>
		<category><![CDATA[com]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[Cons]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Direct]]></category>
		<category><![CDATA[disk encryption]]></category>
		<category><![CDATA[Drive]]></category>
		<category><![CDATA[drive encryption]]></category>
		<category><![CDATA[drive encryption mac]]></category>
		<category><![CDATA[Ear]]></category>
		<category><![CDATA[encrypted virtual drives]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[encryption software]]></category>
		<category><![CDATA[encryption software review]]></category>
		<category><![CDATA[File]]></category>
		<category><![CDATA[filevault 2]]></category>
		<category><![CDATA[free encryption mac]]></category>
		<category><![CDATA[hand]]></category>
		<category><![CDATA[Home]]></category>
		<category><![CDATA[hour]]></category>
		<category><![CDATA[hours]]></category>
		<category><![CDATA[Ice]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[Key]]></category>
		<category><![CDATA[king]]></category>
		<category><![CDATA[LED]]></category>
		<category><![CDATA[Life]]></category>
		<category><![CDATA[mac]]></category>
		<category><![CDATA[mac encryption software]]></category>
		<category><![CDATA[Macs]]></category>
		<category><![CDATA[Mag]]></category>
		<category><![CDATA[Magazine]]></category>
		<category><![CDATA[Men]]></category>
		<category><![CDATA[Mini]]></category>
		<category><![CDATA[New]]></category>
		<category><![CDATA[number]]></category>
		<category><![CDATA[offer]]></category>
		<category><![CDATA[offers]]></category>
		<category><![CDATA[one]]></category>
		<category><![CDATA[pack]]></category>
		<category><![CDATA[per]]></category>
		<category><![CDATA[pgp whole disk encryption]]></category>
		<category><![CDATA[Power]]></category>
		<category><![CDATA[pro]]></category>
		<category><![CDATA[Product]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[rated]]></category>
		<category><![CDATA[recovery]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[reviews]]></category>
		<category><![CDATA[RTi]]></category>
		<category><![CDATA[screen]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[soft]]></category>
		<category><![CDATA[sound]]></category>
		<category><![CDATA[speed]]></category>
		<category><![CDATA[Step]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[the]]></category>
		<category><![CDATA[Tightly]]></category>
		<category><![CDATA[Tool]]></category>
		<category><![CDATA[Top]]></category>
		<category><![CDATA[top rated]]></category>
		<category><![CDATA[Top Review Sources]]></category>
		<category><![CDATA[truecrypt]]></category>
		<category><![CDATA[use]]></category>
		<category><![CDATA[vers]]></category>
		<category><![CDATA[volume]]></category>
		<category><![CDATA[Ware]]></category>
		<category><![CDATA[way]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[whole disk encryption]]></category>
		<category><![CDATA[word]]></category>
		<category><![CDATA[work]]></category>
		<category><![CDATA[Works]]></category>
		<category><![CDATA[x]]></category>
		<guid isPermaLink="false">https://reactual.com/?p=3523</guid>

					<description><![CDATA[<p>There are a growing number of options for Mac drive encryption software. Those interested in the security of drive encryption—which locks down the entire disk behind a nearly impenetrable passcode—are fortunate to have so many programs from which to choose. The best drive encryption solutions meet or exceeds industry-standard security while working transparently and with [&#8230;]</p>
<p>The post <a href="https://reactual.com/software/drive-encryption-solutions-macs.html">The Best Drive Encryption Solutions For Macs</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There are a growing number of options for Mac drive encryption software. Those interested in the security of drive encryption—which locks down the entire disk behind a nearly impenetrable passcode—are fortunate to have so many programs from which to choose. The best drive encryption solutions meet or exceeds industry-standard security while working transparently and with little negative performance impact.</p>
<p>We’ve combed through reviews on websites such as SC Magazine, SecureMac.com, Computerworld, CNET, Techworld, Lifehacker, Ars Technica, The Mac Lawyer, and AnandTech in order to come up with the top rated encryption solutions:</p>
<p><a name="pgp"></a></p>
<figure id="attachment_3525" aria-describedby="caption-attachment-3525" style="width: 435px" class="wp-caption aligncenter"><a href="https://www.symantec.com/business/products/purchasing.jsp?pcid=pcat_info_risk_comp&amp;pvid=wd_encryption_1"><img fetchpriority="high" decoding="async" class="size-full wp-image-3525" src="https://reactual.com/wp-content/uploads/2011/07/PGP-Whole-Disk-Encryption.png" alt="PGP Whole Disk Encryption" width="435" height="233" srcset="https://reactual.com/wp-content/uploads/2011/07/PGP-Whole-Disk-Encryption.png 435w, https://reactual.com/wp-content/uploads/2011/07/PGP-Whole-Disk-Encryption-300x160.png 300w" sizes="(max-width: 435px) 100vw, 435px" /></a><figcaption id="caption-attachment-3525" class="wp-caption-text">PGP Whole Disk Encryption</figcaption></figure>
<h2>PGP Whole Disk Encryption ($140)</h2>
<p>Top Review Sources:</p>
<ul>
<li>SC Magazine: 5.0/5.0 “Best Buy”</li>
<li>SecureMac.com: 5.0/5.0 “After&#8230;installing the product you are a few clicks away from being fully encrypted. The decryption process is just as easy.”</li>
<li>Computerworld: “PGP Whole Disk Protection is a very good choice for protecting the data on a hard drive”</li>
</ul>
<p><a href="https://www.symantec.com/business/products/purchasing.jsp?pcid=pcat_info_risk_comp&amp;pvid=wd_encryption_1" target="_blank">Symantec’s PGP Whole Disk Encryption</a> is a robust full-disk encryption program targeted at business users. The initial encryption process can be lengthy—large drives with lots of files can take several hours to secure. The good news is that you’ll be able to continue your work as PGP Whole Disk Encryption performs its duties in the background. It is also nice that setting up the initial encryption takes just a few steps that are logically and simply presented. PGP Whole Disk Encryption is capable of using a handful of ciphers, including AES, CAST, TripleDES, IDEA, and TwoFish. After the initial encryption process is complete, PGP Whole Disk Encryption operates transparently, encrypting and decrypting files on the fly. Performance impact is negligible, and the only clear indication that the program is working is the authentication screen at startup. Extras include the ability to create encrypted self-extracting files and a file shredding tool for permanent deletion. PGP Whole Disk Encryption can create encrypted virtual drives on unencrypted volumes, plus it will encrypt removable media.</p>
<p>PGP Whole Disk Encryption can be purchased on the <a href="https://www.symantec.com/business/products/purchasing.jsp?pcid=pcat_info_risk_comp&amp;pvid=wd_encryption_1" target="_blank">official website</a>.</p>
<p><a name="truecrypt"></a></p>
<figure id="attachment_3526" aria-describedby="caption-attachment-3526" style="width: 512px" class="wp-caption aligncenter"><a href="https://www.truecrypt.org/downloads"><img decoding="async" class="size-full wp-image-3526" src="https://reactual.com/wp-content/uploads/2011/07/TrueCrypt1.jpg" alt="TrueCrypt" width="512" height="512" srcset="https://reactual.com/wp-content/uploads/2011/07/TrueCrypt1.jpg 512w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt1-200x200.jpg 200w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt1-300x300.jpg 300w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt1-480x480.jpg 480w" sizes="(max-width: 512px) 100vw, 512px" /></a><figcaption id="caption-attachment-3526" class="wp-caption-text">TrueCrypt</figcaption></figure>
<h2>TrueCrypt (Free)</h2>
<p>Top Review Sources:</p>
<ul>
<li>CNET: 4.5/5.0 “Loaded with powerful features”</li>
<li>Techworld: “TrueCrypt&#8230;offers a plethora of configuration settings, default options and operational choices”</li>
<li>Lifehacker: “Our favorite solution for keeping your private files safe, sound, and hidden”</li>
</ul>
<p><a href="https://www.truecrypt.org/downloads" target="_blank">TrueCrypt</a> is feature-packed and free. The program provides full disk encryption via an easy-to-use interface. You’ll be able to choose from three ciphers: AES, Serpent, and Twofish. Initial drive encryption can take many hours, but your Mac remains useable during that time. System performance will be affected during this process, but after it is done, TrueCrypt works seamlessly in the background. The only time you’ll be prompted by TrueCrypt is at the password screen at startup. Not only can you use TrueCrypt to lock down your entire hard drive, you can use it to secure removable drives and create encrypted virtual drives as well. TrueCrypt’s help files are comprehensive and well-written; patient beginners will have few problems learning how to get the most out of the program.</p>
<p>Download TrueCrypt for free on the <a href="https://www.truecrypt.org/downloads" target="_blank">publisher’s site</a>.</p>
<p><a name="filevault"></a></p>
<figure id="attachment_3527" aria-describedby="caption-attachment-3527" style="width: 512px" class="wp-caption aligncenter"><img decoding="async" class="size-full wp-image-3527" src="https://reactual.com/wp-content/uploads/2011/07/FileVault-2.jpg" alt="FileVault 2" width="512" height="512" srcset="https://reactual.com/wp-content/uploads/2011/07/FileVault-2.jpg 512w, https://reactual.com/wp-content/uploads/2011/07/FileVault-2-150x150.jpg 150w, https://reactual.com/wp-content/uploads/2011/07/FileVault-2-300x300.jpg 300w, https://reactual.com/wp-content/uploads/2011/07/FileVault-2-100x100.jpg 100w" sizes="(max-width: 512px) 100vw, 512px" /><figcaption id="caption-attachment-3527" class="wp-caption-text">FileVault 2</figcaption></figure>
<h2>FileVault 2 (Free)</h2>
<p>Pros:</p>
<ul>
<li>Seamless integration into OS X</li>
<li>Can store your recovery key with Apple</li>
</ul>
<p>Cons:</p>
<ul>
<li>OS X 10.7 Lion required</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>Ars Technica: “Disk encryption that actually works”</li>
<li>The Mac Lawyer: “Essentially a complete win-win for business users”</li>
<li>AnandTech: “The new FileVault is a pretty great deal for individuals”</li>
</ul>
<p>Starting with version 10.3 Panther, OS X has included an encryption tool called FileVault. FileVault is able to encrypt the home directory, but is unable to perform a full disk encryption. With version 10.7 Lion, FileVault 2 debuts. A big improvement of FileVault 2 is the ability to encrypt an entire disk. Like the original FileVault, FileVault 2 is tightly integrated into OS X, making it easy to use. During the setup process, FileVault 2 provides a recovery key—a string of characters essential to unlocking your drive if you forget the passcode. You have the option of sharing the recovery key with Apple; if you can’t remember your passcode or recovery key, your last line of defense is to call Apple and answer security questions that you create during the FileVault 2 setup process. After setup, FileVault 2 will restart your computer and begin the drive encryption process. System performance will be diminished, but you’ll be able to work on your computer if you need to. Once the initial encryption is complete, FileVault 2 will encrypt and decrypt files as you work and your system speed should not be significantly impacted. FileVault 2 employs XTS-AES 128-bit encryption.</p>
<p>The post <a href="https://reactual.com/software/drive-encryption-solutions-macs.html">The Best Drive Encryption Solutions For Macs</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://reactual.com/software/drive-encryption-solutions-macs.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Top Rated Drive Encryption Software For PCs</title>
		<link>https://reactual.com/software/drive-encryption-software-pcs.html</link>
					<comments>https://reactual.com/software/drive-encryption-software-pcs.html#respond</comments>
		
		<dc:creator><![CDATA[Justin Thomas]]></dc:creator>
		<pubDate>Sat, 23 Jul 2011 15:37:26 +0000</pubDate>
				<category><![CDATA[Software]]></category>
		<category><![CDATA[200]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[Arc]]></category>
		<category><![CDATA[Auto]]></category>
		<category><![CDATA[available]]></category>
		<category><![CDATA[battery]]></category>
		<category><![CDATA[best drive encryption]]></category>
		<category><![CDATA[bitlocker]]></category>
		<category><![CDATA[boot]]></category>
		<category><![CDATA[cell]]></category>
		<category><![CDATA[com]]></category>
		<category><![CDATA[comes]]></category>
		<category><![CDATA[company]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[Cons]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[disk encryption]]></category>
		<category><![CDATA[Drive]]></category>
		<category><![CDATA[drive encryption]]></category>
		<category><![CDATA[Ear]]></category>
		<category><![CDATA[edge]]></category>
		<category><![CDATA[edition]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[encryption algorithms]]></category>
		<category><![CDATA[encryption review]]></category>
		<category><![CDATA[encryption software]]></category>
		<category><![CDATA[External]]></category>
		<category><![CDATA[external drive]]></category>
		<category><![CDATA[File]]></category>
		<category><![CDATA[file encryption]]></category>
		<category><![CDATA[file encryption software]]></category>
		<category><![CDATA[free zonealarm]]></category>
		<category><![CDATA[hard drives]]></category>
		<category><![CDATA[hardware]]></category>
		<category><![CDATA[hour]]></category>
		<category><![CDATA[hours]]></category>
		<category><![CDATA[Ice]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[Key]]></category>
		<category><![CDATA[king]]></category>
		<category><![CDATA[Laptop]]></category>
		<category><![CDATA[learning curve]]></category>
		<category><![CDATA[LED]]></category>
		<category><![CDATA[levels]]></category>
		<category><![CDATA[light]]></category>
		<category><![CDATA[Low]]></category>
		<category><![CDATA[mac]]></category>
		<category><![CDATA[Machine]]></category>
		<category><![CDATA[Mag]]></category>
		<category><![CDATA[Magazine]]></category>
		<category><![CDATA[maker]]></category>
		<category><![CDATA[Mate]]></category>
		<category><![CDATA[Men]]></category>
		<category><![CDATA[microsoft bitlocker]]></category>
		<category><![CDATA[mode]]></category>
		<category><![CDATA[Money]]></category>
		<category><![CDATA[Multi]]></category>
		<category><![CDATA[New]]></category>
		<category><![CDATA[offer]]></category>
		<category><![CDATA[offers]]></category>
		<category><![CDATA[one]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[pack]]></category>
		<category><![CDATA[PC encryption]]></category>
		<category><![CDATA[PC Magazine]]></category>
		<category><![CDATA[per]]></category>
		<category><![CDATA[pot]]></category>
		<category><![CDATA[price]]></category>
		<category><![CDATA[pro]]></category>
		<category><![CDATA[Product]]></category>
		<category><![CDATA[products]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[rated]]></category>
		<category><![CDATA[recovery]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[reliable]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[Rice]]></category>
		<category><![CDATA[RTi]]></category>
		<category><![CDATA[running]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[soft]]></category>
		<category><![CDATA[speed]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[tee]]></category>
		<category><![CDATA[the]]></category>
		<category><![CDATA[Tightly]]></category>
		<category><![CDATA[tom s hardware]]></category>
		<category><![CDATA[Top]]></category>
		<category><![CDATA[top rated]]></category>
		<category><![CDATA[Top Review Sources]]></category>
		<category><![CDATA[truecrypt]]></category>
		<category><![CDATA[Ultimate]]></category>
		<category><![CDATA[usb]]></category>
		<category><![CDATA[use]]></category>
		<category><![CDATA[used]]></category>
		<category><![CDATA[vers]]></category>
		<category><![CDATA[volume]]></category>
		<category><![CDATA[Ware]]></category>
		<category><![CDATA[way]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[word]]></category>
		<category><![CDATA[work]]></category>
		<category><![CDATA[Works]]></category>
		<category><![CDATA[x]]></category>
		<category><![CDATA[ZoneAlarm]]></category>
		<category><![CDATA[zonealarm datalock]]></category>
		<guid isPermaLink="false">https://reactual.com/?p=3407</guid>

					<description><![CDATA[<ul>
<li><a href="https://reactual.com/?p=3407#truecrypt">TrueCrypt (Free)</a></li>
<li><a href="https://reactual.com/?p=3407#zonealarm">ZoneAlarm DataLock ($37)</a></li>
<li><a href="https://reactual.com/?p=3407#microsoft">Microsoft BitLocker (Free)</a></li>
</ul>
<p>The post <a href="https://reactual.com/software/drive-encryption-software-pcs.html">The Top Rated Drive Encryption Software For PCs</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Commercial drive encryption software is a popular way to encrypt the contents of a disk drive and prevent unauthorized access. Information is encrypted via algorithms that vary in formula but function in similar ways. Most commonly, the encrypted information is accessed via a passcode. As its name suggests, drive encryption protects an entire volume; those looking to encrypt only select folders or files, to have different passcodes, to have varying levels of encryption across a drive should consider file encryption software instead.</p>
<p>After researching expert and user opinions on sites such as CNET, Tom’s Hardware, Techworld, PC Magazine, ITPRO, V3.co.uk, Computerworld, and 4sysops, we’ve compiled a list of the top rated drive encryption software for PCs:</p>
<p><a name="truecrypt"></a></p>
<figure id="attachment_3408" aria-describedby="caption-attachment-3408" style="width: 512px" class="wp-caption aligncenter"><a href="https://www.truecrypt.org/downloads"><img loading="lazy" decoding="async" class="size-full wp-image-3408" src="https://reactual.com/wp-content/uploads/2011/07/TrueCrypt.jpg" alt="TrueCrypt" width="512" height="512" srcset="https://reactual.com/wp-content/uploads/2011/07/TrueCrypt.jpg 512w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt-150x150.jpg 150w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt-300x300.jpg 300w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt-100x100.jpg 100w" sizes="auto, (max-width: 512px) 100vw, 512px" /></a><figcaption id="caption-attachment-3408" class="wp-caption-text">TrueCrypt</figcaption></figure>
<h2>TrueCrypt (Free)</h2>
<p>Pros:</p>
<ul>
<li>Free</li>
<li>Low performance impact</li>
<li>Works across platforms</li>
</ul>
<p>Cons:</p>
<ul>
<li>Learning curve can be steep</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>CNET: 4.5/5.0 “The ultimate freeware encryption program”</li>
<li>Tom’s Hardware: “We recommend downloading and trying TrueCrypt even if you are not looking for a security solution”</li>
<li>Techworld: “TrueCrypt is a real winner and comes at a price that can&#8217;t be beat”</li>
</ul>
<p><a href="https://www.truecrypt.org/downloads" target="_blank">TrueCrypt</a> is a major name in drive encryption software. Once installed, this free software allows the user to encrypt his or her entire drive, a process that initially can take several hours (the computer remains useable during the process). The user can select from three different encryption algorithms (AES, Serpent, and Twofish) or a combination of the three. Once fully encrypted, TrueCrypt continues to automatically protect new information in real time; a single master passcode is all that you need to boot your computer and go about your normal activities. TrueCrypt’s automatic encryption feature is likely to have little noticeable impact on system performance unless you have an older system or are using multi-level encryption—an extra security measure unnecessary for most users. In the event you need to remove TrueCrypt, the decryption process is clean and hassle-free.</p>
<p>TrueCrypt provides the option of partial drive and external drive (including USB flash) encryption. Additionally, TrueCrypt works across platforms, which is great for those who also use Macintosh or Linux. The learning curve for beginners can be steep; the user interface isn’t fully intuitive and there are dangers in using the software without adequate knowledge. However, TrueCrypt’s online documentation is excellent and provides adequate instruction for those willing to invest the time.</p>
<p>TrueCrypt is available for download on the <a href="https://www.truecrypt.org/downloads" target="_blank">manufacturer’s website</a>.</p>
<p><a name="zonealarm"></a></p>
<figure id="attachment_3409" aria-describedby="caption-attachment-3409" style="width: 250px" class="wp-caption aligncenter"><a href="https://www.amazon.com/Zone-Labs-101239-Zonealarm-Datalock/dp/B0041RXTOM?tag=reactual-20"><img loading="lazy" decoding="async" class="size-full wp-image-3409" src="https://reactual.com/wp-content/uploads/2011/07/ZoneAlarm-DataLock.jpg" alt="ZoneAlarm DataLock" width="250" height="378" srcset="https://reactual.com/wp-content/uploads/2011/07/ZoneAlarm-DataLock.jpg 250w, https://reactual.com/wp-content/uploads/2011/07/ZoneAlarm-DataLock-198x300.jpg 198w" sizes="auto, (max-width: 250px) 100vw, 250px" /></a><figcaption id="caption-attachment-3409" class="wp-caption-text">ZoneAlarm DataLock</figcaption></figure>
<h2>ZoneAlarm DataLock ($37)</h2>
<p>Pros:</p>
<ul>
<li>Solid protection from an established brand</li>
<li>24/7 password recovery hotline</li>
<li>Simple encryption process</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>PC Magazine: 4.5/5.0 “Its makers have considered just about every possible eventuality to ensure that you don&#8217;t lock yourself out of the encrypted data”</li>
<li>ITPRO: 5.0/6.0 “Using DataLock is about as simple as it comes”</li>
<li>V3.co.uk: 4.0/5.0 “Good value for money”</li>
</ul>
<p>ZoneAlarm is a familiar and reliable name in internet security. The company’s <a href="https://www.amazon.com/Zone-Labs-101239-Zonealarm-Datalock/dp/B0041RXTOM?tag=reactual-20" target="_blank">DataLock</a> software offers full-disk protection by means of 256-bit AES encryption and a password prompt at startup. A stand-out feature of ZoneAlarm DataLock is the 24-hours-a-day, seven-days-a-week hotline for password recovery. While forgetting your master passcode should be avoided at all costs when using any software encryption program, it is good to know that DataLock provides a convenient means of unlocking your system should you need it. As part of the quick and straightforward setup process, you will create security questions and answers that you’ll have to know in order to recover your password via DataLock’s hotline.</p>
<p>Initial encryption can take hours for hard drives packed with information, but your computer remains useable and subsequent encryption is performed on-the-fly with negligible performance impact. The clean user interface will be familiar to anyone used to using other ZoneAlarm products. Encryption with DataLock is largely set-it-and-forget-it. Note that DataLock is for laptops only; if the software does not find a battery connected to your computer, it will not install.</p>
<p>ZoneAlarm DataLock can be purchased through <a href="https://www.amazon.com/Zone-Labs-101239-Zonealarm-Datalock/dp/B0041RXTOM?tag=reactual-20" target="_blank">Amazon</a>.</p>
<p><a name="microsoft"></a></p>
<figure id="attachment_3411" aria-describedby="caption-attachment-3411" style="width: 264px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-3411" src="https://reactual.com/wp-content/uploads/2011/07/Microsoft-BitLocker.png" alt="Microsoft BitLocker" width="264" height="256" /><figcaption id="caption-attachment-3411" class="wp-caption-text">Microsoft BitLocker</figcaption></figure>
<h2>Microsoft BitLocker (Free)</h2>
<p>Pros:</p>
<ul>
<li>Free</li>
<li>Transparent operation</li>
<li>Seamless incorporation with Windows</li>
</ul>
<p>Cons:</p>
<ul>
<li>Only available for certain editions of Windows</li>
<li>Not as feature-rich as other disk encryption utilities</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>Computerworld: “Encryption is difficult to implement properly&#8230;and Microsoft deserves kudos for making it possible to do this in such a tightly integrated way in Windows”</li>
<li>4sysops: “It greatly simplifies the encryption of a system drive”</li>
<li>PC Magazine: “BitLocker reaches its full potential on computers that include&#8230;a Trusted Platform Module (TPM)”</li>
</ul>
<p>Microsoft’s BitLocker is a free drive encryption utility available for the Enterprise and Ultimate editions of Windows Vista and 7, as well as Windows Server 2008 and Server 2008 R2. Though BitLocker is free, users running versions of Windows other than those listed above are not able to install it. For those using compatible versions of Windows, BitLocker is a strong-performing disk encryption utility. It employs 128-bit AES encryption and several modes of authentication, including entering a PIN at startup, using a passcode saved on a USB flash drive, or utilizing your computer’s Trusted Platform Module (TPM). TPM is an emerging, hardware-based technology that uses a special microchip to verify system integrity before bootup. The TPM stores a key used to unlock the system; if an attacker removes your hard drive, he or she will be unable to read its contents because the drive has been separated from the TPM. Likewise, if the Windows startup process is altered, the TPM will prevent the operating system from loading.</p>
<p>Once activated, BitLocker encrypts new files on-the-fly with very little performance impact. While all disk encryption software takes a slight edge off a computer’s overall speed, BitLocker is one of the least cumbersome. On Windows 7 machines, you also have access to BitLocker To Go, a utility that allows you to encrypt removable media.</p>
<p>The post <a href="https://reactual.com/software/drive-encryption-software-pcs.html">The Top Rated Drive Encryption Software For PCs</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://reactual.com/software/drive-encryption-software-pcs.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 

Served from: reactual.com @ 2026-04-14 10:17:23 by W3 Total Cache
-->