'; $('#et-footer-nav').append(ssl_seal); }); });
ZIPcrypt: Desktop Encryption and Compression Utility
Contact Us for Effective Security Solutions
ZIPcrypt: Desktop Encryption and Compression Utility
Contact Us for Effective Security Solutions
ZIPcrypt: Desktop Encryption and Compression Utility
Contact Us for Effective Security Solutions

ZIPcrypt: Compress and Encrypt Files on your Desktop

Five Ways ZIPcrypt Addresses Cybersecurity Gaps

  1. Easy-to-use downloadable encryption utility.
  2. Harnesses protective strength of widely-used AES 256 and post-quantum XOTIC ciphers free.
  3. Compress and encrypt files and folders of any size from desktop.
  4. Several file-send options for encrypted data.
  5. Intuitive, future-ready protection secures data integrity and confidentiality.

100% CLEAN award granted by Softpedia

With post-quantum 512bit strength, ZIPcrypt for Windows is the clear security alternative to WINZip. When it comes to file-based encryption and data security, there is absolutely no competition.

The much anticipated (Summer 2019) release of ZIPcrypt includes Android and IOS native versions that enable simple user-controlled encryption features specifically designed for mobile devices. In addition to securing images and mobile content, the Android/IOS renditions include the strongest encryption mechanism ever created for secure video chat, text messages, and peer-to-peer file sharing. Mobile ZIPcrypt and Windows ZIPcrypt are designed to work seamlessly together, linking device and desktop.

ZIPcrypt and your Business

  • Easily right-click a folder or file to compress, encrypt and share
  • Uses our patented XOTIC® cryptosystem, the fastest, quantum-resistant encryption available today

What is ZIPcrypt?

  • Strongest, fastest encryption & compression utility.
  • Choice of Secure Channels’ XOTIC® 512-bit (next-generation) encryption or AES-256.
  • NEW – unlock all 9 XOTIC® encryption Dial settings by signing-up to be a BETA user of our SCIFCOM Encryption-as-a-Service portal at beta.scifcom.com
  • (Default) Dial 1 = 512-bit encryption
  • (Archive Strength) Dial 9 = 131,072-bit encryption

ZIPcrypt™: Desktop Encryption and Compression Utility

Addressing the Gaps in Legal Cybersecurity

Legal professionals handle a variety of cases and provide services that demand safe handling of extremely sensitive materials.  Clients must often share volumes of compromising personal information with counsel to receive sound legal representation.  In the interest of justice, The American Bar Association wrote into its Rules of Professional Conduct Rule 1.6: Confidentiality of Information, which includes “(c) A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.”

Confidential data rich in health, financial, insurance, real estate and other protected information are at the heart of many legal proceedings.  The life-altering impact a breach, leak or unplanned disclosure of this information has made it the subject of various data privacy controls.  Far-reaching data privacy controls like the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) impose fines against and assign liability to parties entrusted to safeguard personal information of covered residents.  Industry-pertinent controls like in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the Fair Credit Reporting Act (FCRA, Regulation V) outline rules for parties tasked with protecting data, and steps they must take when they fail to do so.   Law practitioners can face consequences of disbarment, severe financial penalties, legal repercussions and/or destroyed reputations when found in violation of any combination of these controls.  The best practice to comply with each, whether explicitly mandated or vaguely suggested, is using strong, future-ready encryption to store and send sensitive data.

According to a 2019 Ponemon report, the likelihood of an organization experiencing a data breach within the next two years is 29.6 percent.  The global average cost of security breaches is $3.92 million, with U.S. organizations topping the list at $8.21 million.  The frequency and severity of breaches are soaring, increasing the need for stronger security. Despite this, 60 percent of the market resist encryption technology, thinking its deployment will be too complicated and time-consuming. 

ZIPcrypt solves with:

Simplicity: ZIPcrypt is Secure Channels’ freemium downloadable encryption utility.  Users can download the utility and encrypt files to store or send right from their desktop.  Simply right-click a folder or file to quickly compress, encrypt and share.  ZIPcrypt allows for safe sending through existing digital channels like email or cloud transmission.

Strength: ZIPcrypt downloaders can encrypt data at rest and in transit with the widely-used AES 256 cipher or Secure Channels’ post-quantum cryptosystem: XOTIC®.  XOTIC encrypts with its default 512-bit strength, and users signing up for an account with SCIFCOM Encryption-as-a-Service portal can unlock XOTIC’s full range of strengths (up to 131,072-bit) free.

Flexibility: ZIPcrypt encrypts files and folders of any size.  Legal professionals can store or safely transmit encrypted files via their own digital channels or email client.  They may increase the safety of their email transmissions by downloading Secure Channels’ XFA Mail™ plugin to send encrypted email through virtually any client.  Account holders can also safely send 100MB of files free through SCIFCOM, or select a pricing plan that accommodates their advanced transmission needs.

Confidentiality: Files encrypted with ZIPcrypt uphold client confidentiality.  Encrypted files are resistant to beyond quantum-level cyberattacks and reveal no data if leaked or intercepted in transmission.  Laptops, smartphones, and stationary and portable drives housing ZIPcrypt-protected files (in conjunction with appropriate encryption key management) uphold client confidentiality in the event of a compromised device.

Redundancy: A protected backup of files encrypted with ZIPcrypt can help law professionals quickly recover from ransomware attacks or system failures.

Compliance: ZIPcrypt delivers a level of encryption beyond the “reasonable security” prescribed in most data privacy controls.  A compromised organization may find “safe harbor” from damaging breach-reporting protocols if leaked data is encrypted with ZIPcrypt.

Secure Channels Solutions Using ZIPcrypt Technology

Secure Channels Subsidiaries Using ZIPcrypt Technology

ZIPcrypt White Papers & Resources

In The News

7 Key Elements of a Successful Encryption Strategy
The most common method of protecting data in motion is the use of a secure sockets layer...
Quest Diagnostics Says Up to 12 Million Patients May Have Had Financial, Medical, Personal Information Breached
Quest Diagnostics, one of the biggest blood testing providers in the country, on Monday warned...
620 million accounts stolen from 16 hacked websites now for sale on dark web, seller boasts
Exclusive Some 617 million online account details stolen from 16 hacked websites are on sale...

How to Fight Hackers With Quantum Communication

Dr. Marina Mondin from Cal State LA explains how quantum keys beamed via satellites or...
Sergei Hodakova

Hodakova Names SCI Among The Most Interesting in Information Security

Sergei Hodakova Names SCI Among The Most Interesting International Projects in the Field of...

Secure Channels Inc. Named Winner of the Coveted InfoSec Awards during RSA Conference 2020

Secure Channels Inc. Wins Market Leader for Streaming Symmetric Key Exchange and Editor’s...

Technology in the News

How to Avoid the Top Three Causes of Data Breaches in 2019

What's the price of unprotected IT infrastructure? Cybercrime Magazine says that global damages will surpass $6 billion as soon as 2021. Here we'll go through some of the most frequent and emerging causes of data breaches in 2019 and see how to address them in a...

Google confirms ‘quantum supremacy’ breakthrough

Google has officially announced that it’s achieved quantum supremacy in a new article published in the scientific journal Nature. The announcement comes exactly one month after it initially leaked, when Google’s paper was accidentally published early.Did you enjoy...

NordVPN confirms it was hacked

NordVPN, a virtual private network provider that promises to “protect your privacy online,” has confirmed it was hacked. The admission comes following rumors that the company had been breached.Did you enjoy this article? Then read the full version from the author's...

We asked a hacker to try and steal a CNN tech reporter’s data. Here’s what happened

I share, therefore I am. I am the kind of person who posts Instagram photos (filtered, of course) from my vacation. I am also the kind of person who tweets about buying an overly-expensive piece of furniture because I fell for a sleek online ad about how it would...

Newsrooms, let’s talk about G Suite

There are many legitimate reasons to give administrators this far-reaching ability to organize and retain user data, such as compliance with legal requests. All of this logging and retention functionality may also help your organization’s administrators monitor for...

In the last 10 months, 140 local governments, police stations and hospitals have been held hostage by ransomware attacks

The attack starts, innocently enough, with an email. But when someone clicks the link inside, hackers quickly take over. CNN's Tina Burnside, Kevin Collier, Pierre Meihan, Faith Karimi, Eli Watkins and Zachary Cohen contributed to this story. Did you enjoy this...

Cloud Breaches Like Capital One Will Strike At Self-Driving Cars

The news has covered yet another breach of systems security that involves the theft of massive amounts of data, in this case impacting an estimated 100 million customers of Capital One Financial Corp. In the past, the public might have reacted vociferously in outright...

Siemens-Poneman Study: Cyber attacks on power utilities are growing in numbers, complexity

The cybersecurity risks against critical power infrastructure seems to be worsening, as a new study indicates that 56 percent of respondents reported their companies suffered one or more shutdowns or loss of operational data per year. Did you enjoy this article? Then...

Hack Breaks PDF Encryption, Opens Content to Attackers

Researchers in Germany have invented a new hack that can allow someone to break the encryption of PDF files and access their content  — or even forge signed PDF files under certain circumstances. Did you enjoy this article? Then read the full version from the author's...

‘Harvesting Attacks’ & the Quantum Revolution

Stockpiles of stolen information sitting in foreign databases are ready to be exposed the minute there's a working quantum computer in five to ten years. The time to act is now. The Information Age replaced industrial equipment with data. Did you enjoy this article?...