Support
Our London-based product and service technical specialists are on hand to provide expert assistance from product deployment to service support.
Call +44 (0)345 838 2070
Email: [email protected] during normal UK working hours, or please get in touch for bespoke and International support packages.
Product release news
For detailed product release notes, access support resources by registering or login in here.
Vulnerability Reporting
Becrypt maintain vulnerability management processes for our products, services and associated 3rd Party technologies. If you have identified or suspect a vulnerability related to our solutions, please contact us directly at [email protected].
Our Vulnerability Disclosure Policy can be found here.
Product Download Verification
Each Becrypt product has a secure hash code associated with it available from the Becrypt Support Team. This can be easily compared to the hash code of the downloaded file.
For instructions on how to verify please see the attached file.
Release Policy
FAQs
A cross-domain solution (CDS) is a set of technologies and practices designed to securely transfer and share information between different security domains or networks with different levels of classification or sensitivity. It allows organizations to exchange data while maintaining strict control over access, preventing unauthorized disclosure or leakage of sensitive information.
The primary objective of a CDS is to enable secure data transfer across various domains, such as government agencies, military branches, or different departments within an organization. It establishes mechanisms to enforce access controls, monitor and audit data transfers, and prevent data contamination or unauthorized modifications.
CDS typically employ a combination of hardware, software, and security policies to ensure the confidentiality, integrity, and availability of data during the transfer process. These solutions often utilize technologies like data diodes, secure network gateways, or specialized security appliances to enforce strict separation between the source and destination networks.
According to the National Cyber Security Centre, High Assurance refers to security products and systems designed to resist elevated threats—that is, attacks from highly capable adversaries such as state-sponsored or organised crime groups. These solutions go beyond standard defences aimed at commodity threats, ensuring significantly stronger confidence in resisting advanced risks.
Key elements include:
Designed for Elevated Threats
High Assurance products are built with threat modelling that anticipates sophisticated adversaries.
Clear Security Functionality & Limitations
Security functions are precisely defined, and limitations—i.e. threat paths where protection is not provided—must be explicitly documented.
Evidence‑Based, Independent Assessment
Claims of security are verified through systematic, independent testing.
Trusted Suppliers & Best‑Practice Processes
Suppliers should have proven expertise in high-threat domains and follow industry best practices.
Correct Operation & Resilience
The product must operate reliably under threat, mitigating errors or misuse through resilient design, redundancy, and clear configurations. Single points of failure are avoided.
Maintaining a Trusted State
Products must validate the integrity of hardware, software, and data using a hardware root‑of‑trust. If the system becomes un-trusted (e.g. through tampering or corruption), it should detect this and revert to a known safe state.
All product development is undertaken in the UK. We use our own UK Data Centre for our IT infrastructure, with appropriate facility security clearance for physical security. Becrypt staff hold a range of government security clearances, and are trained to follow secure development life-cycle practices.
With the exception of Disk Encryption, all products are currently being offered with support contracts for up to 3 years as standard, with extended periods available by agreement.
The following products are ‘End of Life’ and not subject to further standard release cycles. However, Becrypt can provide extended help desk support if requested by an existing customer. Please contact [email protected] for further information.
- Advanced Port
- Control Connect
- DISK Protect Standard/CPA
- Convex430
- DISK Protect Baseline
- DISK Protect Enhanced
- Media Client
- mShare
- tVolution
Please see Product Release News below for latest shipping products. For Legacy DP, DPE SK and legacy BEM (for DP Management):
DP & DP CPA – 9.4.7
DPE SK – 5.2.1
BEM – 5.5.5
Release notes, resources & More FAQs
Customer Feedback
We are committed to continual quality improvement. Please take 5 minutes to share your experiences using our brief customer feedback form found here.
Not found what you're looking for?
Please contact our Product and Service specialists for assistance.