ZIPcrypt: Compress and Encrypt Files on your Desktop
Five Ways ZIPcrypt Addresses Cybersecurity Gaps
- Easy-to-use downloadable encryption utility.
- Harnesses protective strength of widely-used AES 256 and post-quantum XOTIC ciphers free.
- Compress and encrypt files and folders of any size from desktop.
- Several file-send options for encrypted data.
- Intuitive, future-ready protection secures data integrity and confidentiality.
100% CLEAN award granted by Softpedia
With post-quantum 512bit strength, ZIPcrypt for Windows is the clear security alternative to WINZip. When it comes to file-based encryption and data security, there is absolutely no competition.
The much anticipated (Summer 2019) release of ZIPcrypt includes Android and IOS native versions that enable simple user-controlled encryption features specifically designed for mobile devices. In addition to securing images and mobile content, the Android/IOS renditions include the strongest encryption mechanism ever created for secure video chat, text messages, and peer-to-peer file sharing. Mobile ZIPcrypt and Windows ZIPcrypt are designed to work seamlessly together, linking device and desktop.
ZIPcrypt and your Business
- Easily right-click a folder or file to compress, encrypt and share
- Uses our patented XOTIC® cryptosystem, the fastest, quantum-resistant encryption available today
What is ZIPcrypt?
- Strongest, fastest encryption & compression utility.
- Choice of Secure Channels’ XOTIC® 512-bit (next-generation) encryption or AES-256.
- NEW – unlock all 9 XOTIC® encryption Dial settings by signing-up to be a BETA user of our SCIFCOM Encryption-as-a-Service portal at beta.scifcom.com
- (Default) Dial 1 = 512-bit encryption
- (Archive Strength) Dial 9 = 131,072-bit encryption
ZIPcrypt™: Desktop Encryption and Compression Utility
Addressing the Gaps in Legal Cybersecurity
Legal professionals handle a variety of cases and provide services that demand safe handling of extremely sensitive materials. Clients must often share volumes of compromising personal information with counsel to receive sound legal representation. In the interest of justice, The American Bar Association wrote into its Rules of Professional Conduct Rule 1.6: Confidentiality of Information, which includes “(c) A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.”
Confidential data rich in health, financial, insurance, real estate and other protected information are at the heart of many legal proceedings. The life-altering impact a breach, leak or unplanned disclosure of this information has made it the subject of various data privacy controls. Far-reaching data privacy controls like the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) impose fines against and assign liability to parties entrusted to safeguard personal information of covered residents. Industry-pertinent controls like in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the Fair Credit Reporting Act (FCRA, Regulation V) outline rules for parties tasked with protecting data, and steps they must take when they fail to do so. Law practitioners can face consequences of disbarment, severe financial penalties, legal repercussions and/or destroyed reputations when found in violation of any combination of these controls. The best practice to comply with each, whether explicitly mandated or vaguely suggested, is using strong, future-ready encryption to store and send sensitive data.
According to a 2019 Ponemon report, the likelihood of an organization experiencing a data breach within the next two years is 29.6 percent. The global average cost of security breaches is $3.92 million, with U.S. organizations topping the list at $8.21 million. The frequency and severity of breaches are soaring, increasing the need for stronger security. Despite this, 60 percent of the market resist encryption technology, thinking its deployment will be too complicated and time-consuming.
ZIPcrypt solves with:
Simplicity: ZIPcrypt is Secure Channels’ freemium downloadable encryption utility. Users can download the utility and encrypt files to store or send right from their desktop. Simply right-click a folder or file to quickly compress, encrypt and share. ZIPcrypt allows for safe sending through existing digital channels like email or cloud transmission.
Strength: ZIPcrypt downloaders can encrypt data at rest and in transit with the widely-used AES 256 cipher or Secure Channels’ post-quantum cryptosystem: XOTIC®. XOTIC encrypts with its default 512-bit strength, and users signing up for an account with SCIFCOM Encryption-as-a-Service portal can unlock XOTIC’s full range of strengths (up to 131,072-bit) free.
Flexibility: ZIPcrypt encrypts files and folders of any size. Legal professionals can store or safely transmit encrypted files via their own digital channels or email client. They may increase the safety of their email transmissions by downloading Secure Channels’ XFA Mail™ plugin to send encrypted email through virtually any client. Account holders can also safely send 100MB of files free through SCIFCOM, or select a pricing plan that accommodates their advanced transmission needs.
Confidentiality: Files encrypted with ZIPcrypt uphold client confidentiality. Encrypted files are resistant to beyond quantum-level cyberattacks and reveal no data if leaked or intercepted in transmission. Laptops, smartphones, and stationary and portable drives housing ZIPcrypt-protected files (in conjunction with appropriate encryption key management) uphold client confidentiality in the event of a compromised device.
Redundancy: A protected backup of files encrypted with ZIPcrypt can help law professionals quickly recover from ransomware attacks or system failures.
Compliance: ZIPcrypt delivers a level of encryption beyond the “reasonable security” prescribed in most data privacy controls. A compromised organization may find “safe harbor” from damaging breach-reporting protocols if leaked data is encrypted with ZIPcrypt.