ABOUT ZED!
Encrypted containers for secure file transport
Use ZED! encrypted containers for protecting your transported files, irrespective of the channel used (email, portable device, file transfer, etc.). The .zed containers are analogous to a «diplomatic bag», containing sensitive files that only the identified recipients are entitled to read.
Learn more
The use of encrypted containers is highly intuitive. The style and ergonomics of this «pseudo-folder» makes it very similar to the native compressed (.zip) files of Windows. A click is all it takes to create a container to which you can add files and accesses. The .zed is ready to send, and the files are encrypted. ZED! is capable of transporting a complete tree structure, with no volume constraints.
ZED! technology features a compression algorithm for reducing the total volume of the encrypted container.
ZED! uses keys, either in the form of passwords agreed with a correspondent, or in the form of RSA certificates (LDAP directory or certificate files).
When the sender does not have a certificate for the recipient, the former produces a password for this correspondent, which can be saved in the secure password wallet managed by ZED!.
A recovery plan may be configured by the company. It will be applied automatically and systematically by ZED! so as to enable the Security Officer to recover the files.
In order to allow users to exchange ZED! encrypted containers
with outside contacts, PRIM’X provides for use by anyone a free and multi-platform version called ZEDFREE.
This freeware can be used for opening encrypted containers and working on the content, in order to send subsequently an encrypted response.
LABELS AND CERTIFICATIONS OF ZONECENTRAL