| Feature | Function | Benefit | Std | Ent |
|---|---|---|---|---|
| Zip archives | Reduces file size by as much as 95% | Reduce costs through the conservation of network bandwidth, storage space, and backup tapes |
|
|
| Hardware-accelerated encryption | Encrypt files using System z hardware | Improve workload throughput by using less CPU overhead to perform file encryption |
|
|
| Hardware- accelerated compression | Compresses files using System z hardware | Improve workload throughput by using less CPU overhead to perform file compression |
|
|
| Customize static dictionaries | Enables better compression ratios by tailoring static dictionaries to your business data | Experience greater storage savings and smaller files spanning your network |
|
|
| Support for IBM® Protected Key processing | Blends the performance profile of clear key encryption with the superior private key protection of secure key | Improve workload efficiency by using less CPU to encrypt files with z/OS cryptographic processors |
|
|
| Strong password-based data file protection | SecureZIP supports AES or 3DES encryption to protect valuable information | Files encrypted with SecureZIP may be decrypted and extracted on major enterprise computing platforms using PKZIP or SecureZIP |
|
|
| Encrypt data using passphrases, digital certificates, OpenPGP Keys, or all |
SecureZIP accommodates those who have PKI and those that don't by enabling encryption and decryption via passphrases, public key/private key pairs, or both at the same time depending on the access requirements of each intended recipient. Recipients can then decrypt files by presenting the correct passphrase or private key SecureZIP supports X.509 RSA® v3 certificates issued from recognized certificate authorities such as Comodo®, VeriSign®, Entrust®, and Microsoft®. SecureZIP also supports OpenPGP public/private keys and passphrases |
Maintain control of data by encrypting and decrypting files through business-selected method of encryption, including those files protected with public/ private keys |
|
|
| Digital signatures | Enables users to sign files with their unique digital certificates and OpenPGP Keys | Validate the signature of signed files to ensure the sender is who they claim to be and verify that the document has not been altered or tampered with since signing (may also offer non-repudiation, tracking the signature to the creator) |
|
|
| Secure private key store | Includes a secure private key store that is compliant with mainframe security servers RACF®, ACF2®, and Top Secret® | Simplify management of resources by using your security server as a central point of distribution for public and private keys |
|
|
| Automatic access to public keys in directories | Offers an optional interface that integrates with Lightweight Directory Access Protocol (LDAP) compliant directories, such as Sun® iPlanet, Novell NetWare®, and Microsoft Active Directory® | Locate, retrieve, and apply public keys for certificate-based encryption and decryption with ease |
|
|
| SAF enhanced key stores |
Protects private keys used for signing & decryption Supports the management of using private keys in IBM’s SAF-controlled ICSF CKDS (Cryptographic Key Data Set) |
Improve key management by sharing keys across multiple enterprise applications from an industry standard key store |
|
|
| SAF Secured Passphrase Management | Isolates passphrase management from job execution | Improve operational security with the elimination of exposed passphrases |
|
|
| Hardened policy lockdown |
Establishes security controls strictly enforced using SAF Separates resource control from product installation and job execution |
Enforce security policy to protect against configuration changes, access to product functions and issuing commands Provide auditable logging of changes |
|
|
| FIPS 140-2 mode | Operates using only FIPS 140-2 validated cryptographic modules | Meet compliance standards for encryption mandated by most Federal government agencies |
|
|
| File name encryption | Masks file name, file size, and other information to further protect data if it is intercepted in transit or improperly accessed | Protect data from unintended recipients and internal theft by encrypting information about the file and the meta data defining its contents |
|
|
| Application Integration | Streams data directly to/from applications without staging data to disk | Improve system resource efficiency and reduce risk by not staging sensitive data to disk |
|
|
| System Integration | Provides direct access to read or write files on Windows® or UNIX® servers by the z/OS® operating environment | Reduce total elapsed processing time by decreasing the number of steps needed to create and extract archives |
|
|
| Contingency Key | Ensures organizations are always able to quickly and easily access documents encrypted by their employees | Reduce/eliminate risk associated with improperly used encryption (e.g., insider theft) Ensure data is immediately available in the case of a critical audit |
|
|
| ISPF panel integration | Integrates with IBM’s Interactive System Productivity Facility (ISPF) allowing operators and systems programmers to initiate actions ad hoc, using 3270 screen menus and displays | Simplify product configuration updates and use of product functions through an interface most commonly used by systems programmers and operators |
|
|
| Large file size support | Compresses files up to 8 exabytes in size | Meet IT business requirements by enabling customers to process large files without the need to re-architect their files and applications |
|
|
| Enhanced tape processing |
Reduces the time needed to write files to, and extract files from, tape media; files are written directly to tape media, bypassing the need to stage them to disk first Quickly finds files in larger ZIP archives held on tape |
Improve user and staff productivity by reducing the number of steps and amount of time required to access data |
|
|
| zIIP Support | Offload processing to IBM z Integrated Information Processors (zIIP) | Free up general computing capacity and lower overall total cost of computing for select workloads |
|
|