Feature | Function | Benefit | Standard | Enterprise |
---|---|---|---|---|
Application Integration | Stream data directly to/from applications without staging data to disk | Improve system resource efficiency | ||
Encryption via passphrases and/or digital certificates | Complements PKI and non-PKI environments by enabling encryption and decryption via passphrases, public key/private key pairs, or both at the same time, depending on the requirements of each intended recipient Supports X.509 RSA v3 certificates issued from recognized certificate authorities such as VeriSign®, Entrust®, Comodo®, and Microsoft® |
Encrypt and decrypt files through business-elected method of encryption, including those files protected with certificates and/or public and private keys | ||
Digital signatures | Enables users to sign files with their unique digital certificates | Validate the signature of signed files to ensure the sender is who they claim to be and verify that the document has not been altered or tampered with since signing (may also offer non-repudiation, tracking the signature to the creator) | ||
Contingency key | Provides administrative capabilities to ensure that anything secured will be accessible for audit and/or recovery purposes | Meet business requirements and protect your accessibility to critical data | ||
File name encryption | Masks file name, file size, and other information to further protect data if it is intercepted in transit or improperly accessed | Protect data from unintended recipients and internal theft by encrypting information about the file and the meta data defining its contents | ||
Strong passphrase-based AES and 3DES data file protection | Protect important files using industry standard encryption algorithms that are supported by | Meet compliance requirements using strong encryption; prevent internal and external data theft | ||
Automatic access to public keys in directories | Offers an optional interface that integrates with Lightweight Directory Access Protocol (LDAP) compliant directories, such as Sun® iPlanet, Novell NetWare®, and Microsoft Active Directory® | Locate, retrieve, and apply the public keys for certificate-based encryption and decryption with ease | ||
Large file size support | Compress files up to 8 exabytes in size | Enable customers to process large files without the need to re-architect their files; support IT business requirements | ||
Very large archive support | Over 2 billion files can be included in a ZIP archive | Enable customers to simplify the management of file archives; support IT business requirements | ||
SMTP integration | Distribution of compressed files to end-users simply requires adding a switch and the destination email addresses for the recipients | Save processing time and development effort for file distribution to end-users inside or outside the enterprise; improve user productivity by using fewer manual steps to access zipped files | ||
FTP integration | File transfer can be added to file compression workflows simply by adding a switch to the command string | Save processing time and development effort for file backup, archival, and transfer; improve user productivity by requiring fewer steps to distribute archived files and transfer compressed files | ||
Automatic file wiping | Can be configured to overwrite deleted files, up to seven times, in accordance with NSA specifications | Ensure deleted information cannot later be recovered | ||
Thank you!
SecureZIP for Linux on System z Enterprise Edition uses several advanced security features that require a product key. Please call our support team at 1-888-475-9273 to request your product key to complete the evaluation download process. Thank you!
DATA SECURITY SOFTWARE FOR LINUX ON SYSTEM Z
In an effort to control costs, enterprises are shifting workloads for Linux on the mainframe. SecureZIP for Linux on System z compresses and protects sensitive information, whether Linux installs directly on a LPAR or runs under z/VM. And, it does so using proven ZIP technology, guaranteeing interoperability by efficiently moving data across boundaries, including operating systems, geographic locations, and enterprise perimeters.
Standard Edition
Enterprise Edition
SecureZIP in Action
Application IntegrationWith Application Integration, data can be streamed directly in and out of applications. Without Application Integration, the zip file would be extracted and written to disk as a data file before it can be read by an application. Using Application Integration, this step is eliminated, improving operational efficiency by reducing the number of steps needed to process data.