"PKWARE has provided me with additional insurance of avoiding a breach. "
CISO, International Bank Read More

Features and Benefits

Feature Function Benefit Std Ent
Zip archives Reduces file size by as much as 95% Reduce costs through the conservation of network bandwidth, storage space, and backup tapes check check
Hardware-accelerated encryption Encrypt files using System z hardware Improve workload throughput by using less CPU overhead to perform file encryption check check
Hardware- accelerated compression Compresses files using System z hardware Improve workload throughput by using less CPU overhead to perform file compression check check
Customize static dictionaries Enables better compression ratios by tailoring static dictionaries to your business data Experience greater storage savings and smaller files spanning your network check check
Support for IBM® Protected Key processing Blends the performance profile of clear key encryption with the superior private key protection of secure key Improve workload efficiency by using less CPU to encrypt files with z/OS cryptographic processors check check
Strong password-based data file protection SecureZIP supports AES or 3DES encryption to protect valuable information Files encrypted with SecureZIP may be decrypted and extracted on major enterprise computing platforms using PKZIP or SecureZIP check check
Encrypt data using passphrases, digital certificates, OpenPGP Keys, or all SecureZIP accommodates those who have PKI and those that don't by enabling encryption and decryption via passphrases, public key/private key pairs, or both at the same time depending on the access requirements of each intended recipient. Recipients can then decrypt files by presenting the correct passphrase or private key

SecureZIP supports X.509 RSA® v3 certificates issued from recognized certificate authorities such as Comodo®, VeriSign®, Entrust®, and Microsoft®. SecureZIP also supports OpenPGP public/private keys and passphrases
Maintain control of data by encrypting and decrypting files through business-selected method of encryption, including those files protected with public/ private keys check check
Digital signatures Enables users to sign files with their unique digital certificates and OpenPGP Keys Validate the signature of signed files to ensure the sender is who they claim to be and verify that the document has not been altered or tampered with since signing (may also offer non-repudiation, tracking the signature to the creator) check check
Secure private key store Includes a secure private key store that is compliant with mainframe security servers RACF®, ACF2®, and Top Secret® Simplify management of resources by using your security server as a central point of distribution for public and private keys check check
Automatic access to public keys in directories Offers an optional interface that integrates with Lightweight Directory Access Protocol (LDAP) compliant directories, such as Sun® iPlanet, Novell NetWare®, and Microsoft Active Directory® Locate, retrieve, and apply public keys for certificate-based encryption and decryption with ease check check
SAF enhanced key stores Protects private keys used for signing & decryption

Supports the management of using private keys in IBM’s SAF-controlled ICSF CKDS (Cryptographic Key Data Set)
Improve key management by sharing keys across multiple enterprise applications from an industry standard key store check check
SAF Secured Passphrase Management Isolates passphrase management from job execution Improve operational security with the elimination of exposed passphrases check check
Hardened policy lockdown Establishes security controls strictly enforced using SAF

Separates resource control from product installation and job execution
Enforce security policy to protect against configuration changes, access to product functions and issuing commands

Provide auditable logging of changes
check check
FIPS 140-2 mode Operates using only FIPS 140-2 validated cryptographic modules Meet compliance standards for encryption mandated by most Federal government agencies check check
File name encryption Masks file name, file size, and other information to further protect data if it is intercepted in transit or improperly accessed Protect data from unintended recipients and internal theft by encrypting information about the file and the meta data defining its contents check check
Application Integration Streams data directly to/from applications without staging data to disk Improve system resource efficiency and reduce risk by not staging sensitive data to disk check check
System Integration Provides direct access to read or write files on Windows® or UNIX® servers by the z/OS® operating environment Reduce total elapsed processing time by decreasing the number of steps needed to create and extract archives check check
Contingency Key Ensures organizations are always able to quickly and easily access documents encrypted by their employees Reduce/eliminate risk associated with improperly used encryption (e.g., insider theft) Ensure data is immediately available in the case of a critical audit check check
ISPF panel integration Integrates with IBM’s Interactive System Productivity Facility (ISPF) allowing operators and systems programmers to initiate actions ad hoc, using 3270 screen menus and displays Simplify product configuration updates and use of product functions through an interface most commonly used by systems programmers and operators check check
Large file size support Compresses files up to 8 exabytes in size Meet IT business requirements by enabling customers to process large files without the need to re-architect their files and applications check check
Enhanced tape processing Reduces the time needed to write files to, and extract files from, tape media; files are written directly to tape media, bypassing the need to stage them to disk first

Quickly finds files in larger ZIP archives held on tape
Improve user and staff productivity by reducing the number of steps and amount of time required to access data check check
zIIP Support Offload processing to IBM z Integrated Information Processors (zIIP) Free up general computing capacity and lower overall total cost of computing for select workloads check check