Sensitive enterprise data needs to be secure during transfer and at it origin and destination. Enterprises can’t risk data being "in the clear" at any point of the transfer process.
Adding SecureZIP data-centric security to the transfer process mitigates the risk of data being exposed in the event of a data breach. The PKWARE SecureZIP Solution protects the data during transit and at the endpoints. Data moves securely across all major computing platforms and operating systems, ensuring that sensitive data is protected throughout the entire transfer process.
Data-centric encryptionData is never transferred or received "in the clear". |
Trusted dataDigital signing, time stamping, and authentication ensure that the data has not been compromised. |
| Supports multiple industry-standard security formats, including OpenPGP and .ZIP, as well as most operating system platforms. |
Never lose control of your dataContingency key allows enterprises to have a "master key" to all data. |
Meet compliance mandates with strong encryption includingFIPS 140-2, HIPAA, SOX, PCI, etc. |
Easy installationIntegrates quickly for both you and your partners. |
File compression is an added bonusFile size can be reduced by up to 95% to maximize bandwidth. Data can be encrypted and zipped at any convenient time ahead of the transfer batch jobs running to spread processing workload. |
| PKWARE SecureZIP | Data21 ZIP/390 | ASPG Megacryption | IBM Encryption Facility | |
|---|---|---|---|---|
| Native z/OS Implementation | ![]() |
1 |
![]() |
|
| X.509 ZIP Format | ![]() |
|||
| OpenPGP Format | ![]() |
2 |
![]() |
2 |
| Other Platforms | ![]() |
3 |
||
| Contingency Key | ![]() |
|||
|
1 Compression & symmetric encryption is native to z/OS, PKI encryption is offloaded to a Windows server 2 Not natively on z/OS – Data21 offloads to Windows server, IBM EF is Java 3 Windows, Linux, Unix OpenPGP support |
||||
| SecureZIP + FTP | FTP | FTPS/sFTP | MFT | |
|---|---|---|---|---|
| Compression | ![]() |
1 |
||
| Security: Transmission Level |
2 |
![]() |
![]() |
|
| Security: Computer to Computer |
2 |
![]() |
||
| Security: Data Centric |
![]() |
|||
|
1 Most MFTs provide some basic level of compression 2 Implicit through data centric security |
||||