Discover ZED!

Absolute confidentiality and optimum protection:
ZED! and ZEDPRO protect your personal and sensitive data in encrypted archives on e-mail, on USB sticks and in backups.

39.90€ex VAT
  • Unlimited files
  • Unlimited nb of accesses
Buy ZEDPRO
  • Encryption

    With its encryption technology derived from various certified professional solutions, ZED! guarantees optimal levels of data protection and confidentiality for exchange and storage. The data encrypted by ZED! can only be decrypted by users with a valid access key.


  • Zed!, user-friendly and intuitiveUser-friendly and intuitive

    Using all versions of ZED! is highly intuitive.
    Create a .zed container in a single click to which you can add folders, files and grant users. The container is then ready to be sent, with the inside files encrypted. ZED! is able to transport an entire file tree structure with no volume constraints.


  • Different access key formats

    Access key ZED! uses access keys, either in the form of passwords or in the form of standard certificates.
    The main user defines his own personal access. Then, to exchange with one or several correspondent(s), he chooses an access key in accordance with each recipient.

  • File compression

    ZED! technology features a compression algorithm for reducing the total size of the encrypted .zed container.
    Slimmed down in this way, this makes it easier to archive, store, backup or send by e-mail.



  • Technical specifications

    ZED! uses AES encryption algorithms (128 to 256 bits). The software is available on Windows starting from Windows 7 (32 and 64 bits), Linux (CentOS and Ubuntu - 32 and 64-bit versions) and macOS (from High Sierra 10.13) platforms.