zlinux

Features and Benefits

Feature Function Benefit Standard Enterprise
Application Integration Stream data directly to/from applications without staging data to disk Improve system resource efficiency check check
Encryption via passphrases and/or PKI Complements PKI and non-PKI environments by enabling encryption and decryption via passphrases, PKI, or both at the same time, depending on the requirements of each intended recipient

Supports X.509 RSA v3 certificates issued from recognized certificate authorities such as VeriSign®, Entrust®, Comodo®, Microsoft®, and OpenPGP Keys
Encrypt and decrypt files through business-elected method of encryption, including those files protected with certificates and/or public and private keys check check
Digital signatures & time-stamping Enables users to sign files with their unique digital certificates Validate the signature of signed files to ensure the sender is who they claim to be and verify that the document has not been altered or tampered with since signing (may also offer non-repudiation, tracking the signature to the creator) check check
Contingency key Provides administrative capabilities to ensure that anything secured will be accessible for audit and/or recovery purposes Meet business requirements and protect your accessibility to critical data check check
File name encryption Masks file name, file size, and other information to further protect data if it is intercepted in transit or improperly accessed Protect data from unintended recipients and internal theft by encrypting information about the file and the meta data defining its contents check check
Strong passphrase-based AES and 3DES data file protection Protect important files using industry standard encryption algorithms that are supported by Meet compliance requirements using strong encryption; prevent internal and external data theft check check
Automatic access to public keys in directories Offers an optional interface that integrates with Lightweight Directory Access Protocol (LDAP) compliant directories, such as Sun® iPlanet, Novell NetWare®, Microsoft Active Directory®, and OpenPGP Key Rings Locate, retrieve, and apply the public keys for certificate-based encryption and decryption with ease check check
Large file size support Compress files up to 8 exabytes in size Enable customers to process large files without the need to re-architect their files; support IT business requirements check check
Very large archive support Over 2 billion files can be included in a ZIP archive Enable customers to simplify the management of file archives; support IT business requirements check check
SMTP integration Distribution of compressed files to end-users simply requires adding a switch and the destination email addresses for the recipients Save processing time and development effort for file distribution to end-users inside or outside the enterprise; improve user productivity by using fewer manual steps to access zipped files check check
FTP integration File transfer can be added to file compression workflows simply by adding a switch to the command string Save processing time and development effort for file backup, archival, and transfer; improve user productivity by requiring fewer steps to distribute archived files and transfer compressed files check check
Automatic file wiping Can be configured to overwrite deleted files, up to seven times, in accordance with NSA specifications Ensure deleted information cannot later be recovered check check