Powertech Encryption for IBM i

Database Encryption Software for IBM i

Protect sensitive IBM i data with encryption, key management, and auditing
 

Text

Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Powertech Encryption allows organizations to encrypt database fields, backups and IFS files quickly and effectively with its intuitive screens and proven technology.

 

Protect Sensitive Data

Our database encryption software allows organizations to encrypt database fields, backups, and IFS files quickly and effectively with its intuitive screens and proven technology. Organizations around the world depend on Powertech Encryption to help secure confidential data on IBM i (iSeries, AS/400), as well as data from distributed systems, from both external hackers and unauthorized internal users.

Satisfy Stringent Requirements for Encryption and Key Management

Powertech Encryption will help your organization to comply with regulations through its integrated key management solution and strong IBM i field encryption and backup encryption features. Powertech Encryption utilizes AES and TDES encryption algorithms, both of which follow standard (non-proprietary) specifications as published by the United States National Institute of Standards and Technology (NIST). AES and TDES are widely used for protecting highly sensitive data and complying with PCI DSS, HIPAA and State Privacy laws. Powertech Encryption also includes comprehensive auditing features, easing the pain of compliance reporting.

IBM i Encryption Made Easy

IBM i database encryption doesn't need to be difficult or time consuming. The design of Powertech Encryption allows organizations to implement encryption quickly using intuitive screens and commands, while providing a high degree of protection. Every effort has been made in Powertech Encryption to minimize the application changes needed, allowing an organization to implement encryption successfully for less time and money.

System requirements: IBM i 7.1 or higher

 

[Powertech Encryption for IBM i] is well designed. There are not a lot of software products that impress me, but I have to say that I really like the way [Powertech Encryption for IBM i] works. It was easy to implement and allowed us to meet all the requirements for securing our data to get PCI compliant.

Tommy Sellers, Love's Travel Stops and Country Stores

Key Features

Field Encryption

Card image cap

Use database encryption software to automatically encrypt sensitive database fields and columns using strong encryption AES or TDES without making changes to your application programs. Access to data can be tightly controlled at the field/user level and only authorized users will have the ability to decrypt data and gain access to the full or masked values. Decryption of any data can be fully audited in Powertech Encryption, which will log the user ID, date, time, job information, and key utilized.

KEEP READING >

Get Started

Find out how strong encryption, tokenization, integrated key management and auditing can help protect your sensitive IBM i data and meet compliance regulations. Request a free demo of Powertech Encryption for IBM i today.

SCHEDULE A WALKTHROUGH