PKWARE

PKWARE

PKWARE

PKWARE, Inc. is an enterprise software company founded in 1986, by Phil Katz, co-inventor of the ZIP standard. PKWARE provides encryption and data compression software used by thousands of organizations in banking, financial services, healthcare and government.
Today PKWARE is revolutionizing data security with PK Protect, the world’s most advanced suite of data protection solutions.

Open/Close all the descriptions

PKZIP

Reduce file sizes by up to 95% and improve system performance
Year after year, the amount of data being stored and exchanged around the world increases at an exponential rate. Costs for data storage and transmission continue to grow, whether organizations maintain their files on premise or in the cloud. An efficient, flexible solution for data compression is essential for managing costs and resource demands.
Having introduced the ZIP file format nearly three decades ago, PKZIP continues to set the worldwide standard for data compression and file management

Unmatched performance
With PKZIP, organizations can compress files by up to 95%, reducing storage costs and greatly improving file transmission times. PKZIP can handle even the largest compression tasks, with capabilities to include more than 2 billion files in a single archive and compress files over 9 exabytes in size. PKWARE’s lossless compression technology ensures that all data (including file metadata) is retained when a file is zipped.
Flexibility and administrative control
PKZIP is compatible with all major enterprise computing platforms and supports multiple archive formats, making it easy to exchange data across the organization efficiently and effectively. Users can compress files in several archive formats, including ZIP, TAR, BZ2, and many others.
Enterprise customers can use PKZIP’s policy manager to standardize compression activities according to organizational policies and best practices, helping maximize efficiency, system performance, and resource savings.

Features:

  • PKZIP provides exceptional performance and ease of use across all enterprise operating systems.
  • Compression
  • Command Line Interface
  • Cross Platform Functionality

Available for:
Server
IBM i
Linux for z system
IBM z/OS.

SecureZIP

Enterprise-grade data encryption
Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries.
PKWARE’s SecureZIP enables organizations of all kinds to implement persistent data protection while gaining visibility into where files are used, shared, and stored.

Compression and encryption in one solution
SecureZIP combines PKWARE’s industry-leading compression technology with strong encryption, allowing organizations to reduce data storage and transfer costs while ensuring the security of their information as it moves across hardware platforms, applications, mobile devices, and the cloud.

Industry-leading protection
Available for all major computing platforms, SecureZIP supports passphrase-based and digital certificate-based encryption, offering flexible security for any business environment. SecureZIP also supports two-factor authentication using smart cards or tokens, allowing for an additional layer of security.
With SecureZIP, organizations of any size can reduce the burden of data storage and transmission, while maintaining compliance with internal and external security mandates.

Features:

  • SecureZIP makes it easy to protect sensitive information and reduce the demands on IT infrastructure.
  • Persistent File Encryption
  • X.509 and OpenPGP Encryption
  • Cross Platform Functionality

Available for:
Server
IBM i
Linux for z system
IBM z/OS.

Smartcrypt

Next-generation Encryption and key management
The world has changed. Information is everywhere. And you have no idea where it is.
Every day, thieves, snoops, and idiots exploit the gaps in enterprise information security. It’s time to stop believing in solutions that focus solely on network and device access. Today’s threats require us to protect the data itself.
PKWARE’s Smartcrypt is a revolution in enterprise data protection, allowing customers to protect their data at rest and in use, even when it moves outside the organization.

Smart encryption technology
Smartcrypt delivers persistent data protection without the tradeoffs that (until now) have prevented organizations from adopting strong encryption. Previously challenging tasks such as key generation, synchronization, and exchange are completely automated, making the encryption process transparent to end users and easier for administrators to control.

The Smartcrypt platform consists of four components:

Application: An end user application that encrypts and decrypts protected data on any enterprise operating system.
Manager: A web-based management console that gives administrators organization-wide control over encryption activities.
SDK:The Smartcrypt Software Development Kit provides a simple way for developers to embed persistent data protection into existing applications.
TDE: Smartcrypt Transparent Data Encryption (TDE) protects sensitive information at rest on enterprise servers and enables compliance with a wide range of regulatory requirements and customer privacy mandates.

Together, these components create a flexible data security solution that’s compatible with even the most complex enterprise architecture.

Eliminating the threat
Data breaches can burden organizations with massive penalties, sky-high legal fees, and reputation damage than can take years to repair. Smartcrypt, PKWARE’s next-generation encryption and key management solution, eliminates these risks, ensuring that data remains protected everywhere it is used, shared, and stored.

Features:
Smartcrypt delivers a revolutionary combination of functionality, ease of use, and flexibility, allowing organizations to configure an optimal data security solution.

  • Persistent File Encryption
  • Application Layer Encryption
  • Encryption Key Management
  • Key Generation
  • Key Synchronization and Exchange
  • Policy Management and Control
  • Data Security Intelligence
  • X.509 and OpenPGP Encryption
  • Digital Signing and Authentication
  • Compression
  • Cross Platform

PK Protect

Powered by PKWARE e Dataguise technology

The PK Protect product suite comprises everything customers need to secure their most sensitive data and meet their compliance goals by finding sensitive data in structured, unstructured, and semi-structured content supporting detection, remediating sensitive data exposure for risk and compliance obligations, and tracking how and where sensitive data is being accessed.

Make sensitive data discovery and protection easier with a solution that’s intuitive to implement and use, and saves you time, resources, compliance costs, and complication. With the PK Protect Suite, businesses are empowered to work safely with sensitive data to make better business decisions, gain greater customer insights, move to the cloud, and generate new revenue streams.

Meet requirements under GDPR, CCPA, PCI-DSS, HIPAA, ITAR and other regulatory and industry mandates.

Protect data with a mix of masking and encryption based on who needs access and how the data will be used/viewed.

The suite encompasses the following solutions:

  • PK Discovery

Without requiring a single line of code, PK Discovery delivers fine-grained, aggregated optics into what sensitive data you have and where it resides. Find information stored on file servers, big data repositories, databases, endpoint devices, and across the enterprise. Integration with other PK Protect Suite capabilities can then trigger automatic encryption, masking, redaction, or other remediation for sensitive information.

  • PK Classification

Keeping a fast, dynamic and continuous record of the types of sensitive data an organization has. Data classification solutions are an essential component of helping organizations categorize data based on custom or predefined policies used to ensure the security of personal and sensitive data. Systematic, enterprise-wise classification simplifies compliance, improves end-user awareness of security policies, and makes other security technology more effective.

  • PK Encryption

Dynamically encrypting data in motion or at rest on the broadest platform in the industry

Quickly secure files and data without application changes, additional infrastructure, or professional services, and all without disrupting existing workflows. PK Encryption empowers both persistent encryption that applies protection directly to the data, or transparent data encryption for protecting stored data on enterprise servers.

  • PK Masking

Maintain control of sensitive data by masking it consistently across data stores. Static masking options can keep the data masked at rest, while dynamic masking options only mask data when it is in use. Automatically mask sensitive data in a DBMS to fully leverage the entire data set for more accurate and meaningful insight and measurement without compromising data security

  • PK Privacy

Control your company’s data privacy at the data, enterprise, and individual level with powerful PK Privacy engineering solutions, powered by Dataguise technology.

Today, businesses are required to stay on top of the privacy rights of hundreds of thousands—perhaps even millions—of individuals protected by multiple regulations. Meeting these requirements for privacy starts with understanding the variables and makeup of your different data subject groups relevant to each regulatory restriction. With PK Privacy, organizations have the methodologies, tools, and techniques to achieve required and acceptable levels of privacy.

This right-to-know discovery solution indexes identities and the data about those identities. Once PK Privacy discovers data, it can automatically encrypt, mask, redact, delete, or otherwise remediate personal information as requested. Continuous monitoring for privacy data makes it easy to respond to a DSAR with the right policy.

Enable pseudonymization, anonymization, and de-identification of private personal data.