Encryption

  • Database Encryption Software for IBM i

Encryption

Powertech Encryption for IBM i

Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Powertech Encryption allows organizations to encrypt database fields, backups and IFS files quickly and effectively with its intuitive screens and proven technology.

Protect Sensitive Data:

Our database encryption software allows organizations to encrypt database fields, backups, and IFS files quickly and effectively with its intuitive screens and proven technology. Organizations around the world depend on Powertech Encryption to help secure confidential data on IBM i (iSeries, AS/400), as well as data from distributed systems, from both external hackers and unauthorized internal users.

Satisfy Stringent Requirements for Encryption and Key Management:

Powertech Encryption will help your organization to comply with regulations through its integrated key management solution and strong IBM i field encryption and backup encryption features. Powertech Encryption utilizes AES and TDES encryption algorithms, both of which follow standard (non-proprietary) specifications as published by the United States National Institute of Standards and Technology (NIST). AES and TDES are widely used for protecting highly sensitive data and complying with PCI DSS, HIPAA and State Privacy laws. Powertech Encryption also includes comprehensive auditing features, easing the pain of compliance reporting.

IBM i Encryption Made Easy:

IBM i database encryption doesn't need to be difficult or time consuming. The design of Powertech Encryption allows organizations to implement encryption quickly using intuitive screens and commands, while providing a high degree of protection. Every effort has been made in Powertech Encryption to minimize the application changes needed, allowing an organization to implement encryption successfully for less time and money.

System requirements: IBM i 7.1 or higher

[Powertech Encryption for IBM i] is well designed. There are not a lot of software products that impress me, but I have to say that I really like the way [Powertech Encryption for IBM i] works. It was easy to implement and allowed us to meet all the requirements for securing our data to get PCI compliant.

Will Crowe
Love's Travel Stops and Country Stores

What You Get with a Powertech Encryption for IBM i?

Strong Encryption

Secure confidential information and satisfy compliance regulations easily

Key Management

Key management for encryption and PCI compliance.

Tokenization

Replace sensitive data with unique identification numbers to improve PCI compliance.

Audit Trails

Comprehensive auditing for meeting the most stringent security requirements.

First-Rate Support

Get your questions answered by a real person 24/7.

Key Features:

Use database encryption software to automatically encrypt sensitive database fields and columns using strong encryption AES or TDES without making changes to your application programs. Access to data can be tightly controlled at the field/user level and only authorized users will have the ability to decrypt data and gain access to the full or masked values. Decryption of any data can be fully audited in Powertech Encryption, which will log the user ID, date, time, job information, and key utilized.

Encryption_Funcionalidad1

Powertech Encryption uses strong AES encryption to encrypt and decrypt files and folder on the Integrated File System (IFS). All types of IFS stream files can be encrypted including text, PDF, JPG, TIF, CSV and XLS files. The encryption of IFS files can be completely automatic for designated folders or can be user-driven using Powertech Encryption commands that can be entered on the IBM i command line, placed in CL programs, incorporated in BRMS and used in job schedulers on the IBM i.

Encryption_Funcionalidad2

Powertech Encryption provides native backup (tape) encryption for IBM i customers that wish to protect their sensitive backup media including entire libraries, objects and/or IFS files. Backups can be protected using keys from Powertech Encryption's Key Management System to provide strong security. Powertech Encryption's backup and restore commands can be entered on the IBM i command line, placed in CL programs, incorporated in BRMS and used in job schedulers on the IBM i, automating the process of encrypting your backups.

Encryption_Funcionalidad3

Powertech Encryption includes an advanced key management system which resides natively on the IBM i and is seamlessly integrated with Powertech Encryption’s policy controls, encryption functions, and auditing facilities to provide a comprehensive data protection solution. Together with the integrated security on IBM i, organizations can strictly control access to key maintenance/usage activities and meet compliance requirements. Powertech Encryption’s key management also support live partition mobility (LPM) handling by automatically adjusting the Master Encryption Key when moving a partition to new hardware. Powertech Encryption also provides interfaces for securely sharing keys with other systems such as point-of-sale (POS) systems, Windows, Linux, and AIX.

Encryption_Funcionalidad4

Tokenization should be considered when sensitive data is stored on multiple systems throughout an organization. Tokenization is the process of replacing sensitive data with unique identifcation numbers (e.g. tokens) and storing the original data on a central server, typically in encrypted form. By centralizing sensitive data onto a single system, tokenization can help thwart hackers and minimize the scope of compliance audits such as PCI.

Encryption_Funcionalidad5

Powertech Encryption includes comprehensive auditing for meeting the most stringent security requirements. Audit log entries are generated for a variety of critical events. These audit log entries can be displayed and printed using a variety of selection criteria, including date/ time range, user and audit type. Alert messages can also be sent to QSYSOPR, QAUDJRN, email, and SYSLOG.

Encryption_Funcionalidad6

Reference Material

Information (Web Site)

Note 1: Some of the content (images and texts) used in this page are property of Fortra