Attention: the NIAPC web site may not include all approved products.The list of approved products is always changing; there is a backlog of approved products still to be added to this information portal, and there are delays in responding to queries and inclusion of new products. NATO is reviewing options to improve collaboration and provide more timely information sharing of approved security products.
Zed! version Q2020.1, Q2020.2, Q2021.1

Zed! encrypted containers are used to protect file transports regardless of the method used (email attachment, USB stick, removable device, file transfer, etc.).
Zed! containers are like "diplomatic suitcases" because they contain sensitive information only their recipients are authorized to read.

User-friendly and intuitive

Encrypted container use is very intuitive. The style and the feel of these "pseudofolders" make them very similar to the native compressed (.zip) files of Windows.
In just one click, the user creates a container to which he adds folders, files, and accesses. The .zed is ready to be sent, the files are encrypted. Zed! is capable of transporting an entire tree structure, with no limitation on volume.

File compression

Zed! technology includes a compression algorithm that reduces the total size of the encrypted container.

Different access key formats

Zed! uses keys, either in the form of passwords, agreed upon with a correspondent, or in the form of RSA certificates (certificate files or LDAP directory).

Integrated password wallet

When the sender has no certificate for the recipient, they can create a password for this correspondent and store it in their secure password wallet managed by Zed!.

Recovery

A recovery plan can be configured by the company. It will be automatically and systematically applied by Zed! to enable the Security Officer to recover files.

Freeware for an encrypted response

To allow users to exchange Zed! encrypted containers with their external contacts, Prim'X has made a free version, called "Zed! Limited Edition", available to everyone. This version is used to read encrypted containers and modify their content to ensure responses are encrypted.

Additional Notes

Technical specifications

  • ALGORITHMS:
    AES (128 to 256 bits) and RSA (1024 to 4096 bits).
  • TECHNOLOGIES:
    PKCS#1, PKCS#5, PKCS#11, X509, Microsoft CSP, LDAP technologies, PKIx compatible.
  • SYSTEMS:
    Available for Windows 11 to Windows 7, Linux (various distributions) and Mac OS.
  • LANGUAGES:
    Available in 7 languages.
  • ZED! mobile app for iOS and Android.
Product Images

Common Criteria Details

CC Certification / Validation Report Reference

CC Security Target / TOE Reference

Product Categories

Security Mechanism Groups

General Information

Manufacturer

Prim'X
Country

France

Product Documents

No Product Documents are available for the moment.

Product QR Code

Last Update Time:
30-Jul-2024 01:11 PM
Please enter a search term !