Pkware

Displaying 1-4 of 4 results

  • White Papers // Oct 2009

    Contingency Access to Enterprise Encrypted Data

    This paper discusses an example where uncontrolled encryption can be harmful to an organization. Contingency keys provide a mechanism by which an organization can keep control of the data within the enterprise. It looks at some common use cases for encryption and how contingency keys can be incorporated into those...

    Provided By Pkware

  • White Papers // Oct 2009

    Data Compression Benchmark and ROI Analysis

    Data compression offers a technology solution for increasing the efficiencies and decreasing the costs of storing and transferring critical business information. With average compression rates of 50 percent per file, it makes sense to integrate compression technology into business processes and applications. PKZIP compression solutions offer trusted technologies to help...

    Provided By Pkware

  • White Papers // Oct 2009

    Overcoming the Obstacles: Creating Cooperative Partnerships in Securing the Exchange of Data

    Best practices in today's marketplace dictate that data entrusted to affiliates within a data-exchange process should be protected as it is transmitted, wherever it resides. However, some parties are more committed to securing information than others. This creates a problem that security-minded companies, typically the primary enterprise within the data-exchange...

    Provided By Pkware

  • White Papers // Aug 2009

    Tales From the Frontlines: SecureZIP and IBM System z Integrated Cryptographic Services Facility

    PKWARE's SecureZIP leverages the System z hardware and software facilities, regardless of the hardware features enabled in a specific installation. Secured archives (ZIP files) can be used not only on the platform they were created on, but also any platform that SecureZIP runs on. In addition, SecureZIP maximizes the investment...

    Provided By Pkware

  • White Papers // Oct 2009

    Contingency Access to Enterprise Encrypted Data

    This paper discusses an example where uncontrolled encryption can be harmful to an organization. Contingency keys provide a mechanism by which an organization can keep control of the data within the enterprise. It looks at some common use cases for encryption and how contingency keys can be incorporated into those...

    Provided By Pkware

  • White Papers // Oct 2009

    Data Compression Benchmark and ROI Analysis

    Data compression offers a technology solution for increasing the efficiencies and decreasing the costs of storing and transferring critical business information. With average compression rates of 50 percent per file, it makes sense to integrate compression technology into business processes and applications. PKZIP compression solutions offer trusted technologies to help...

    Provided By Pkware

  • White Papers // Oct 2009

    Overcoming the Obstacles: Creating Cooperative Partnerships in Securing the Exchange of Data

    Best practices in today's marketplace dictate that data entrusted to affiliates within a data-exchange process should be protected as it is transmitted, wherever it resides. However, some parties are more committed to securing information than others. This creates a problem that security-minded companies, typically the primary enterprise within the data-exchange...

    Provided By Pkware

  • White Papers // Aug 2009

    Tales From the Frontlines: SecureZIP and IBM System z Integrated Cryptographic Services Facility

    PKWARE's SecureZIP leverages the System z hardware and software facilities, regardless of the hardware features enabled in a specific installation. Secured archives (ZIP files) can be used not only on the platform they were created on, but also any platform that SecureZIP runs on. In addition, SecureZIP maximizes the investment...

    Provided By Pkware