PKWARE

PKWARE

PKWARE, Inc. is an enterprise software company founded in 1986, by Phil Katz, co-inventor of the ZIP standard. PKWARE provides encryption and data compression software used by thousands of organizations in banking, financial services, healthcare and government.
Today PKWARE is revolutionizing data security with PK Protect, the world’s most advanced suite of data protection solutions.

Open/Close all the descriptions

PKZIP

Reduce file sizes by up to 95% and improve system performance
Year after year, the amount of data being stored and exchanged around the world increases at an exponential rate. Costs for data storage and transmission continue to grow, whether organizations maintain their files on premise or in the cloud. An efficient, flexible solution for data compression is essential for managing costs and resource demands.
Having introduced the ZIP file format nearly three decades ago, PKZIP continues to set the worldwide standard for data compression and file management

Unmatched performance
With PKZIP, organizations can compress files by up to 95%, reducing storage costs and greatly improving file transmission times. PKZIP can handle even the largest compression tasks, with capabilities to include more than 2 billion files in a single archive and compress files over 9 exabytes in size. PKWARE’s lossless compression technology ensures that all data (including file metadata) is retained when a file is zipped.
Flexibility and administrative control
PKZIP is compatible with all major enterprise computing platforms and supports multiple archive formats, making it easy to exchange data across the organization efficiently and effectively. Users can compress files in several archive formats, including ZIP, TAR, BZ2, and many others.
Enterprise customers can use PKZIP’s policy manager to standardize compression activities according to organizational policies and best practices, helping maximize efficiency, system performance, and resource savings.

Features:

  • PKZIP provides exceptional performance and ease of use across all enterprise operating systems.
  • Compression
  • Command Line Interface
  • Cross Platform Functionality

Available for:
Server
IBM i
Linux for z system
IBM z/OS.

SecureZIP

Enterprise-grade data encryption
Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries.
PKWARE’s SecureZIP enables organizations of all kinds to implement persistent data protection while gaining visibility into where files are used, shared, and stored.

Compression and encryption in one solution
SecureZIP combines PKWARE’s industry-leading compression technology with strong encryption, allowing organizations to reduce data storage and transfer costs while ensuring the security of their information as it moves across hardware platforms, applications, mobile devices, and the cloud.

Industry-leading protection
Available for all major computing platforms, SecureZIP supports passphrase-based and digital certificate-based encryption, offering flexible security for any business environment. SecureZIP also supports two-factor authentication using smart cards or tokens, allowing for an additional layer of security.
With SecureZIP, organizations of any size can reduce the burden of data storage and transmission, while maintaining compliance with internal and external security mandates.

Features:

  • SecureZIP makes it easy to protect sensitive information and reduce the demands on IT infrastructure.
  • Persistent File Encryption
  • X.509 and OpenPGP Encryption
  • Cross Platform Functionality

Available for:
Server
IBM i
Linux for z system
IBM z/OS.

Smartcrypt

Next-generation Encryption and key management
The world has changed. Information is everywhere. And you have no idea where it is.
Every day, thieves, snoops, and idiots exploit the gaps in enterprise information security. It’s time to stop believing in solutions that focus solely on network and device access. Today’s threats require us to protect the data itself.
PKWARE’s Smartcrypt is a revolution in enterprise data protection, allowing customers to protect their data at rest and in use, even when it moves outside the organization.

Smart encryption technology
Smartcrypt delivers persistent data protection without the tradeoffs that (until now) have prevented organizations from adopting strong encryption. Previously challenging tasks such as key generation, synchronization, and exchange are completely automated, making the encryption process transparent to end users and easier for administrators to control.

The Smartcrypt platform consists of four components:

Application: An end user application that encrypts and decrypts protected data on any enterprise operating system.
Manager: A web-based management console that gives administrators organization-wide control over encryption activities.
SDK:The Smartcrypt Software Development Kit provides a simple way for developers to embed persistent data protection into existing applications.
TDE: Smartcrypt Transparent Data Encryption (TDE) protects sensitive information at rest on enterprise servers and enables compliance with a wide range of regulatory requirements and customer privacy mandates.

Together, these components create a flexible data security solution that’s compatible with even the most complex enterprise architecture.

Eliminating the threat
Data breaches can burden organizations with massive penalties, sky-high legal fees, and reputation damage than can take years to repair. Smartcrypt, PKWARE’s next-generation encryption and key management solution, eliminates these risks, ensuring that data remains protected everywhere it is used, shared, and stored.

Features:
Smartcrypt delivers a revolutionary combination of functionality, ease of use, and flexibility, allowing organizations to configure an optimal data security solution.

  • Persistent File Encryption
  • Application Layer Encryption
  • Encryption Key Management
  • Key Generation
  • Key Synchronization and Exchange
  • Policy Management and Control
  • Data Security Intelligence
  • X.509 and OpenPGP Encryption
  • Digital Signing and Authentication
  • Compression
  • Cross Platform

PK Protect

Powered by PKWARE e Dataguise technology

The PK Protect product suite comprises everything customers need to secure their most sensitive data and meet their compliance goals by finding sensitive data in structured, unstructured, and semi-structured content supporting detection, remediating sensitive data exposure for risk and compliance obligations, and tracking how and where sensitive data is being accessed.

Make sensitive data discovery and protection easier with a solution that’s intuitive to implement and use, and saves you time, resources, compliance costs, and complication. With the PK Protect Suite, businesses are empowered to work safely with sensitive data to make better business decisions, gain greater customer insights, move to the cloud, and generate new revenue streams.

Meet requirements under GDPR, CCPA, PCI-DSS, HIPAA, ITAR and other regulatory and industry mandates.

Protect data with a mix of masking and encryption based on who needs access and how the data will be used/viewed.

The suite encompasses the following solutions:

  • PK Discovery

Without requiring a single line of code, PK Discovery delivers fine-grained, aggregated optics into what sensitive data you have and where it resides. Find information stored on file servers, big data repositories, databases, endpoint devices, and across the enterprise. Integration with other PK Protect Suite capabilities can then trigger automatic encryption, masking, redaction, or other remediation for sensitive information.

  • PK Classification

Keeping a fast, dynamic and continuous record of the types of sensitive data an organization has. Data classification solutions are an essential component of helping organizations categorize data based on custom or predefined policies used to ensure the security of personal and sensitive data. Systematic, enterprise-wise classification simplifies compliance, improves end-user awareness of security policies, and makes other security technology more effective.

  • PK Encryption

Dynamically encrypting data in motion or at rest on the broadest platform in the industry

Quickly secure files and data without application changes, additional infrastructure, or professional services, and all without disrupting existing workflows. PK Encryption empowers both persistent encryption that applies protection directly to the data, or transparent data encryption for protecting stored data on enterprise servers.

  • PK Masking

Maintain control of sensitive data by masking it consistently across data stores. Static masking options can keep the data masked at rest, while dynamic masking options only mask data when it is in use. Automatically mask sensitive data in a DBMS to fully leverage the entire data set for more accurate and meaningful insight and measurement without compromising data security

  • PK Privacy

Control your company’s data privacy at the data, enterprise, and individual level with powerful PK Privacy engineering solutions, powered by Dataguise technology.

Today, businesses are required to stay on top of the privacy rights of hundreds of thousands—perhaps even millions—of individuals protected by multiple regulations. Meeting these requirements for privacy starts with understanding the variables and makeup of your different data subject groups relevant to each regulatory restriction. With PK Privacy, organizations have the methodologies, tools, and techniques to achieve required and acceptable levels of privacy.

This right-to-know discovery solution indexes identities and the data about those identities. Once PK Privacy discovers data, it can automatically encrypt, mask, redact, delete, or otherwise remediate personal information as requested. Continuous monitoring for privacy data makes it easy to respond to a DSAR with the right policy.

Enable pseudonymization, anonymization, and de-identification of private personal data.

WinZip

WinZip

Developed by WinZip Computing now acquired by Corel Corporation

Winzip Standard e Winzip Pro

Zip, protect, manage and share your files with WinZip.

  • Zip and unzip instantly.
  • Manage all your files in one place.
  • Share directly to cloud, social media and IM.
  • Convert to PDF, add watermarks and resize photos.
  • Connect and share on the go with ZipShare

 

 

StarNet

StarNet

StarNet Communications Corporation was founded in 1989 and incorporated in 1990 by engineers working part-time out of their home. The  corporate mission was to create and market powerful, yet affordable PC-X server products for corporate, education and government markets.

The first X Server product, MicroX, was launched in 1991. It enabled users of 286 and 386-based Intel systems to access the X Window System from their personal computers. Quite possibly, StarNet was the first company to base its entire business model on the Internet, because in 1991, the Internet was mostly used by universities and government agencies. As a result, and aided by its low cost, simplicity and focus on the X server functionality, X-Win32 quickly became popular in these sectors.

StarNet has grown its market share by bringing a steady stream of innovations to the market, starting in 2000 with integrating SSH and most recently with FastX which allows users to access their remote Linux and Unix desktop through standard PC browsers. FastX also offers the ability to Suspend/Resume sessions.

 

Open/Close alle the descriptions

X-WIN32

The Best PC X Server for X Windows Display on Your LAN

After nearly 25 years of development, X-Win32 is the most versatile PC X Server for displaying remote Unix and Linux desktops and individual X applications. X-Win32 is widely used in demanding engineering design sectors such as defense/aerospace, molecular biology, and IC design with applications like Cadence Virtuoso.

Best Security

X-Win32 comes with an integrated SSH that encrypts all data between the client and the server, making remote x terminal connections from home and elsewhere very secure.

Fastest 3D/Rendering

The hardware acceleration on the local PC and the implementation of 65 OpenGL extensions allow X-Win32 to offer the fastest OpenGL support in the industry. 3D applications like Catia and Eclipse work like they were running locally.

Text/Graphics
Copy & Paste

X-Win32 is the only PC X Server that offers integrated copying of both text and graphics from X applications into Windows.

Multiple X Desktop

With X-Win32, open remote Unix and Linux desktops from several different hosts at the same time. You can Alt-Tab between Unix, Linux and Windows desktops, even copy data from one host to another.

Dynamic Window Scaling

X-Win32 is the first PC X server having activated the RandRextension, you can now scale the remote desktop simply by grabbing the corner of the window and dragging it to the desired size. You can also scale the window to be larger than your actual monitor.

 

FastX

The First Remote Linux Solution in the Cloud

FastX is the first and only remote Linux solution that allows users to connect to their sessions from any device with a web browser, even from your smart phone.

Linux in a browser

Only FastX gives you the option of using any standard web browser to connect you to your remote Linux sessions (Firefox, Chrome, Internet Explorer or Safari). FastX also works on mobile browsers, so you can check in from your smart phone or tablet.

Fastest Remote Linux Display

FastX displays your remote Linux or Unix desktops or individual X applications faster than any other solution over both LAN and WAN connections. You can work on demanding graphic applications (EDA tools) when connecting over VPN to servers even thousands of miles away.

An Affordable Solution

FastX costs a fraction of what commercial competitors charge. the combination of a lower cost, better performance and security, and advanced end-user and admin features make FastX the best X Windows emulator on the market.
Admin tools

FastX offers an array of administrator tools to keep your team running securely and efficiently. Server monitoring, scripted installation and theme support, to name a few.

Load Balancing

Only FastX gives you the option of using any standard web browser to connect you to your remote Linux sessions (Firefox, Chrome, Internet Explorer or Safari). FastX also works on mobile browsers, so you can check in from your smart phone or tablet.

Ericom

Ericom

Ericom Software is a leading global provider of Access, Virtualization and RDP Acceleration solutions. Since 1993, Ericom enables organizations across all industries to provide secure, centrally managed access to applications, desktops and data running on Microsoft RDS / Terminal Services, VDI, Cloud platforms, and other systems, from a broad range of end user computers and mobile devices.

Open/Close all the descriptions

Terminal emulation – client based

PowerTerm® Lite

Powerful and Secure Terminal Emulation for Unix

PowerTerm Lite, Ericom Software’s terminal emulation products for Unix, maximize the capabilities of legacy systems with a minimal amount of installation time and software space. Because PowerTerm Lite has a small footprint, it is easily installable on any PC, making it a simple and fast solution for running legacy applications. PowerTerm Lite’s rich feature set and fast key response has made it the product of choice for thousands of corporations throughout the world.

With a Terminal Server License, PowerTerm Lite can be used by multiple users simultaneously.

PowerTerm® Plus

Powerful and Secure Terminal Emulation for Unix

PowerTerm Plus, Ericom Software’s terminal emulation product for Unix, maximizes the capabilities of legacy systems with a minimal amount of installation time and software space. Because PowerTerm Plus has a small footprint, it is easily installable on any PC, making it a simple and fast solution for running legacy applications. PowerTerm Plus’s rich feature set and fast key response has made it the product of choice for thousands of corporations throughout the world.
PowerTerm Plus includes SSH, FTP Client and SFTP client

With a Terminal Server License, PowerTerm Plus can be used by multiple users simultaneously.

 

PowerTerm Interconnect

Client Based Terminal Emulator Software for Windows, Mac, Linux
The PowerTerm InterConnect Series is comprised of several robust terminal emulation applications supporting the host access needs of large and small organizations. It allows enterprises to standardize on a single host access solution.

PowerTerm InterConnect products provides fast and reliable access to data residing on the broadest range of hosts, such as: IBM Mainframe zSeries, IBM AS/400 iSeries, UNIX, OpenVMS, Tandem, HP.

Each of the PowerTerm InterConnect products enables terminal emulation via various communication modes including: IBM 3270, IBM 3151, IBM 5250, AT386, Wyse 370, Data General, Tandem 6530, HZ 1500, IBM 525, ANSI, Linux Console, Wyse 50+/50/60, HP 700/92, Siemens, VT 52 – 525, SCO, AIXterm, Televideo, HP 700/96, ADDS VP A2.

PowerTerm InterConnect is available in the following editions:
PowerTerm Interconnect Windows Edition, PowerTerm Interconnect Mac OS X Edition e PowerTerm Interconnect  Linux Edition.

PowerTerm® Pro/Enterprise

Secure 3270 and 5250 Terminal Emulators for Windows – with VBA
The PowerTerm Pro Series is Ericom Software’s premier 3270 and 5250 terminal emulation solution for Windows that simplifies and extends legacy access functionality. Supporting a diverse range of hosts and emulation types, PowerTerm Pro enables corporations to standardize on a single host access solution. Featuring a customizable GUI, SSL, SSH and secure file transfer (SFTP), PowerTerm Pro and PowerTerm Pro/Enterprise offers a number of options, so corporations can choose the PowerTerm Pro product that meets their host, security, server and productivity needs.
PowerTerm Pro Enterprise offers the full functionality of PowerTerm Pro while incorporating Microsoft Visual Basic® for Applications (VBA) and the leading security protocols such as SSL and SSH.

 

Terminal emulation – Web-based

PowerTerm WebConnect HostView

Web–to–Host Access: Secure & Centrally Managed

In today’s economy, one of the best ways for an organization to emerge as productive and agile is to optimize their IT resources. Ericom helps organization achieve this with PowerTerm WebConnect HostView browser-based (web to host) emulation. Leverage the benefits of PC-client access software and server-based computing to take legacy assets to a new level. Supporting over 35 terminal emulation types (including IBM 3270 IBM 5250, VT, HP and Tandem), Ericom’s web-to-host terminal emulation software connects to applications running on a wide range of legacy hosts, including IBM Mainframe (zSeries), IBM Midrange (iSeries), OpenVMS, HP3000, Unix, Linux, Tandem and others.

 

HTML5 Browser based

Ericom AccessNow™ HTML5 RDP Client

HTML5 In Browser RDP Access – Easy to use and simple setup!
AccessNow is an HTML5 remote desktop gateway that works from any device with an HTML5 compatible browser, including from Chromebooks and locked down devices
Ericom AccessNow is the market’s first high performance HTML5 RDP Client, providing browser access to Windows applications and desktops (virtual & physical), running on Windows Terminal Services / RDS / VDI platforms, including Microsoft Hyper-V and other hypervisors. Now supports Windows 10 and Windows Server 2012 R2
Zero Client Software! No need to install: Flash, Silverlight, ActiveX or any other underlying technology on the end-user device
Access and control your desktop from anywhere! Use any HTML5 enabled Device, Smartphone / Tablet (e.g., iPad, iPhone, Android device), locked-down work station, or computer running Windows, Mac OS X, Linux or Chrome OS.

Ericom AccessNow ™ for VMware View ™

Pure HTML5 Access to View Virtual Desktops — from any HTML5–enabled –browser or client device
Enable users to quickly and easily connect to VMware Horizon View (VMware VDI) desktops directly from any HTML5 compatible browser on any platform. This includes from Windows, Mac, Linux, iPad / iPhone, Google Chromebook, Android, RIM BlackBerry / Playbook, Amazon Kindle Fire HD — even locked-down Workstations — without having to download, install or configure any software on the end-point device. Now supports Windows 8 and Windows Server 2008.

 

Centrally managed Access with terminal emulation

PowerTerm WebConnect Enterprise

PowerTerm WebConnect Enterprise (Windows Edition) provides secure, centrally managed enterprise-wide access to applications and desktops, running on Windows Terminal Servers, Virtual Desktops, Blade PCs and legacy host systems, from Windows, Mac and Linux PCs, thin clients, tablets, smartphones, as well as any end-point device supporting an HTML5 browsere

 

RDP Acceleration

Blaze

Frustrated by Slow RDP sessions or PDF scrolling? Get up to 10x faster graphics, animations & response times!

Ericom Blaze RDP compression and acceleration software delivers a great local PC-like experience across WAN / LAN, while reducing bandwidth consumption and optimizing RDP network traffic. Use it to speed up slow remote desktop connections, PDF displays, and audio / video performance on terminal services (RDS).

 

Centrally managed Access

PowerTerm WebConnect Deskview

As an enhanced connection broker, PowerTerm WebConnect DeskView enables organizations to deploy and centrally manage Windows virtual desktops hosted on the latest virtualization platforms, including hypervisors from VMware, Microsoft, Oracle, Xen, etc., as well as on PCoIP Blade PCs and PCoIP Workstations.

Ericom Connect

Hyper–Scalability and Management Simplicity
Ericom Connect is a powerful remote application and desktop access solution. Built on innovative technology and two decades of Ericom’s proven expertise in the access market, Ericom Connect offers organizations unparalleled scalability, superior user experience and exceptional ease of use. With great cost performance, Connect integrates into existing IT environments, reducing the need for costly infrastructure upgrades.
Take advantage of Connect’s ease of implementation, powerful reporting and scalability to overcome day-to-day business challenges and accelerate your growth. Supporting the widest range of user devices, Connect ensures employees can easily access the resources and services they need to be productive, wherever they are and whichever device they’re working on
Connect leverages both Amazon and Microsoft cloud SQL as a service, enabling smoother and faster deployments of cloud-based services such as DaaS

Connect is available in the following edition: Ericom Connect Enterprise and Ericom Connect Professional.

Secure Browsing

Ericom Shield

Ericom Shield – the safest way to let users browse the web.

Web browsing in as integral part of standard business operations. Yet, risk user browsing generates the majority of security breaches.
Ericom Shield is Ericom’s next generation browser isolation solution. Leveraging Ericom’s proven virtualization and browsing technologies, Ericom Shield creates an isolated “safezone” that protects corporate networks and end-user devices from web-borne attacks. All active content is routed to a virtual remote browser and is safely isolated from the local network reducing the attack surface to prevent malware breaches.

Each browsing session powers up a dedicated virtual browser that executes web browsing in an isolated and disposable container. Web content is viewed as a visual representation streamed to the end user without executing any code on the endpoint. While browsing, file downloads are sanitized in the background without impacting user experience or file functionality. At the end of each session, the remote container is discharged.

Any operating system, browser and device are supported.

Network Management Tools

Network Management Tools

Solution that automates asset discovery and application dependency mapping.

C.H. Ostfeld has a distribution agreement with BMC Software  for a solution that creates a dynamic, holistic view of all data center assets and the  relationships between them, giving IT crucial visibility into how the assets support  the business.

The solution provided are:

BMC Discovery

 

 

Terminal Emulation

Terminal Emulation

A wide range of solution for every need

Ericom Software Partner since 1997.

Since 1993, Ericom’s best-in-class PowerTerm Series terminal emulator products have been meeting a wide range of business host-access challenges. Increasing enterprise-wide productivity, Ericom’s terminal emulators enable reliable, secure and easy access to accounting, inventory, management, and other mission critical applications.
Taking advantage of Ericom PowerTerm terminal emulators, organizations around the world are able to standardize on a single host access solution that supports over 35 terminal emulator types, while facilitating compliance with key industry and regulatory standards, including GLBA, PCI, FIPS, HIPAA, FISMA, SOX and JSOX.

The solutions provided are:

PowerTerm Lite
PowerTerm Plus
PowerTerm Pro
PowerTerm InterConnect
PowerTerm HostView

Security and Digital Signature

Security and Digital Signature

Solutions for the information security

Information security is a very sensitive issue in technical and computer field because of the growing computerization of society and in the use of IT equipment and private systems. IT managers have to deal with vulnerability analysis, risk, threats or attacks and therefore they have to protect hardware and software and data.

This protection is achieved through technical and organizational measures aimed at ensuring:

  • the correct data;
  • data confidentiality (encryption);
  • the physical and / or logical access only to authorized users (authentication);
  • the use of all and only the services provided for that user in the times and in the manner provided by the system;
  • the digital signature;
  • data security on mobile devices;
  • remote browser isolation
  • password security

The solutions provided are:

Okta
Wandera
SecureZip
PentaZip-PRO
PentaSuite-Pro
Enforcive
Smartcrypt
Ericom Shield
Keeper

 

Asset Management

Asset Management

Asset Management of a company

The IT asset management can take time and budget. Insufficient management of hardware and software configuration can affect up to 80% on the entire life cycle of the computer, and together with a number of hardware and software  management tools can become an expensive cost. BMC Software solutions, BMC Client Management, Discovery and BMC Track-It!, together with the Lansweeper and  Snow Software solutions, face this kind of need.
Our sales and technical staff, are certified  by BMC Software. They also passed the ITIL V3 certification.

The solutions provided are:

BMC Client management
BMC Discovery
Track-it!
Lansweeper
Snow Software

Service Desk / Help Desk

Service Desk / Help Desk

Solutions for customer or user support, internal or external, that have problems in the management of products or services

According to ITIL, the definition of a Service Desk is –  a communication center that provides a single point of contact between users and IT Service Management. Tasks include handling incidents and requests, and providing an interface for other ITIL processes. The primary functions of the Service Desk are incident control, life cycle management of all service requests, and communicating with the customer. The purpose of a service desk is to ensure that users receive appropriate help in a timely manner

C.H. Ostfeld has a distribution agreement with BMC Software for Footprints, Track-it! and RemedyForce and with ITRP. The staff dedicated to technical support are certified by BMC Software, VMware and AirWatch Wandera. They also passed the ITIL V3 certification.
C.H. Ostfeld offer to interested companies and organizations, a complete service for the fullfilment of an Help Desk and Service solution.

The solutions provided are:

Track-it!
Footprints Service Core
RemedyForce
4me

Training

Training

C.H. Ostfeld specialists also provide user training on application software distributed.