Symantec Command Line

Powered by PGP Technology

Free Trial

Internet Security Threat Report, Volume 21

Learn about the cyber threat landscape and the potential impact it has against you and your organization.

Read the Report

Protect Confidential Data in Automated Business Processes

Symantec Command Line powered by PGP Technology enables organizations to quickly and easily integrate encryption into batch processes, scripts, and applications to ensure the security of corporate data at rest or in transit. Whether your challenge is protecting credit card information, financial transactions, payroll, medical records, or other confidential information, Command Line's scriptable encryption is a key part of an organization's data protection tool kit.

Download the Data Sheet

System Requirements

Supported Operating Systems

  • Microsoft Windows® Enterprise and Pro (32-bit and 64-bit): 7, 8, 8.1, 8.1 Nov. 2014 Update, 10, 10 Nov. 2015 Update
  • Microsoft Windows® Server: 2008 (32-bit and 64-bit), 2008 R2 (64-bit), 2012 (64-bit), 2012 R2 (64-bit)
  • Red Hat® Enterprise Linux/CentOS (32-bit and 64-bit): 5.10, 5.11, 6.6, 6.7, 7.0, 7.2
  • SUSE® Linux Enterprise Server: 11.3 (32-bit and 64-bit), 12.0 (64-bit)
  • Oracle Solaris® versions: 10 (SPARC and x86, 32-bit and 64-bit), 11 (SPARC and x86-64, 64-bit)
  • IBM AIX® (32-bit and 64-bit): 6.1, 7.1, 7.2
  • Hewlett Packard Enterprise HP-UX® (64-bit): 11i and later for Itanium2 and similar processors
  • Apple Mac OS X®: 10.9.5, 10.10.5

Additional technical information is posted on the Support section of the Symantec website, https://support.symantec.com.

Public Key Formats

  • OpenPGP (RFC 4880)
  • X.509 v3

Directory Servers

  • LDAP
  • Symantec Encryption Management Server
  • PGP® Global Directory

Symmetric Key Algorithms

  • AES (up to 256-bit keys)
  • CAST5
  • TripleDES
  • IDEA
  • Twofish
  • Blowfish*
  • Arc4 (128-bit keys)

 

Hashes

  • SHA-1, SHA-256, SHA-384, SHA-512
  • MD5
  • RIPEMD-160

Public Key Algorithms

  • Diffie-Hellman (up to 4096-bit keys)
  • DSA (1024-bit keys only, verification up to 3072 bits)
  • RSA (up to 4096-bit keys)

Compression Algorithms

  • Zip
  • BZip2
  • ZLib

*Support for Blowfish is limited to decrypting existing messages encrypted with Blowfish or encrypting to existing keys that specify Blowfish as the preferred cipher.

Command Line for IBM Power Systems and IBM Mainframes

Command Line products for IBM System i and IBM System z Mainframes can be purchased from Townsend Security. Please see Townsend’s website (http://townsendsecurity.com/products/encryption-and-tokenization/PGP-file-encryption) for system requirements, features, and purchasing information.

Add-Ons

Symantec Encryption Management Server

Symantec Encryption Management Server works together with PGP Command Line to create, organize, distribute, store, and track encryption keys. You can replace the locally managed keys used for your automated file transfer processes with centralized, secure key management from the Encryption Management Server.

Resources

Order online Buy Via Partner Free Trial

RETURNING USERS RENEW UPGRADE LICENSING