| Feature |
Function |
Benefit |
Standard |
Enterprise |
| Application Integration |
Stream data directly to/from applications without staging data to disk |
Improve system resource efficiency |
 |
 |
| ZIP archives |
Reduce file size by as much as 95% |
Reduce costs through the conservation of bandwidth, storage space, and backup tapes |
 |
 |
| Cross-platform data portability |
ZIP archives are portable data containers that can be read and decompressed on all major enterprise computing platforms |
Reduce the cost of cross-operating system data transfers and management |
 |
 |
| Large file size support |
Compress files up to 8 exabytes in size |
Enable customers to process large files without the need to re-architect their files; meet IT business requirements |
 |
 |
| Very large archive support |
Over 2 billion files can be included in a ZIP archive |
Enable customers to simplify the management of file archives; meet IT business requirements |
 |
 |
| Decryption of PKI encrypted ZIP and OpenPGP archives |
Decrypt and extract files that are public-key encrypted by SecureZIP products |
Decrypt files through an organization-elected method of encryption, including those files protected with public and private keys |
 |
 |
| Self-extracting files for end-users and other platforms |
ZIP archives can be formatted as self-extracting files for Windows end-users or for UNIX/Linux operating systems; compressed data can be easily unzipped in one easy step (licensed for internal use only) |
Improve user productivity by using fewer manual steps to access zipped files |
 |
 |
| SMTP integration |
Distribution of compressed files to end-users simply requires adding a switch and the destination email addresses for the recipients |
Save processing time and development effort for file distribution to end-users inside or outside the enterprise; improve user productivity by using fewer manual steps to access zipped files |
 |
 |
| FTP integration |
File transfer can be added to file compression workflows simply by adding a switch to the command string |
Save processing time and development effort for file backup, archival, and transfer; improve user productivity by requiring fewer steps to distribute archived files and transfer compressed files |
 |
 |
| Automatic file wiping |
Can be configured to overwrite deleted files, up to seven times, in accordance with NSA specifications |
Ensure deleted information cannot later be recovered |
 |
 |