Because encrypted data can’t be compressed, the costs associated with transferring encrypted data can be significant in terms of elapsed time, bandwidth and CPU usage. And, once that data reaches its destination, there are storage costs to consider.
The PKWARE SecureZIP Solution reduces data by up to 95% while securing the data, resulting in faster data transmission without the need to increase bandwidth and storage costs.
Data-centric encryptionData is never transferred or received "in the clear". |
Trusted dataDigital signing, time stamping, and authentication ensure that the data has not been compromised. |
| Supports multiple industry-standard security formats, including OpenPGP and .ZIP, as well as most operating system platforms. |
Never lose control of your dataContingency key allows enterprises to have a "master key" to all data. |
Meet compliance mandates with strong encryption includingFIPS 140-2, HIPAA, SOX, PCI, etc. |
Easy installationIntegrates quickly for both you and your partners. |
File compression is an added bonusFile size can be reduced by up to 95% to maximize bandwidth. Data can be encrypted and zipped at any convenient time ahead of the transfer batch jobs running to spread processing workload. |
| PKWARE SecureZIP | Data21 ZIP/390 | ASPG Megacryption | IBM Encryption Facility | |
|---|---|---|---|---|
| Native z/OS Implementation | ![]() |
1 |
![]() |
|
| X.509 ZIP Format | ![]() |
|||
| OpenPGP Format | ![]() |
2 |
![]() |
2 |
| Other Platforms | ![]() |
3 |
||
| Contingency Key | ![]() |
|||
|
1 Compression & symmetric encryption is native to z/OS, PKI encryption is offloaded to a Windows server 2 Not natively on z/OS – Data21 offloads to Windows server, IBM EF is Java 3 Windows, Linux, Unix OpenPGP support |
||||
| SecureZIP + FTP | FTP | FTPS/sFTP | MFT | |
|---|---|---|---|---|
| Compression | ![]() |
1 |
||
| Security: Transmission Level |
2 |
![]() |
![]() |
|
| Security: Computer to Computer |
2 |
![]() |
||
| Security: Data Centric |
![]() |
|||
|
1 Most MFTs provide some basic level of compression 2 Implicit through data centric security |
||||