Powertech Encryption for IBM i

Key Management

Key Management for Encryption and PCI Compliance


Crypto Complete includes an advanced Key Management system which resides natively on the IBM i. This Key Management system is seamlessly integrated with Crypto Complete’s policy controls, encryption functions and auditing facilities to provide a comprehensive data protection solution.

Together with the integrated security on IBM i, organizations can strictly control access to Key maintenance and usage activities to meet stringent compliance requirements such as PCI DSS. The encryption keys can either reside on the same IBM i system or partition as the data or can be managed and stored on a different system or partition.

Secure Multi-Level Architecture

Crypto Complete provides a secure multi-level architecture to protect Data Encryption Keys on IBM i.

Key Management Encryption

Key Features

Policy Settings

Establish policy settings on how Data Encryption Keys can be created and utilized for compliance requirements (e.g. dual control, separation of duties)

Strong Key Values

Randomly generate strong Key values up to 256 bits in length

User-Based Authorization

Control which users are authorized to create and manage Keys. Access can be controlled by user profiles, group profile and/or authorization lists.

Integration Options

Option to import or link to Data Encryption Keys from other Key Management Systems, including Vormetric and Safenet

Secure Interfaces

Powertech Encryption for IBM i provides interfaces for securely sharing Keys with other systems such as point-of-sale (POS) systems, Windows, Linux and AIX.

Key Protection

Protect Data Encryption Keys using Master Encryption Keys and restrict the retrieval of the actual Data Encryption Key values

Dual Control

Protect the recreation of a Master Encryption Key by requiring passphrases from 2 to 8 users

Key Stores

Organize Data Encryption Keys into one or more Key Stores


Produce detailed audit logs on all Key management activities

Get Started

Find out how strong encryption, tokenization, integrated key management and auditing can help protect your sensitive IBM i data and meet compliance regulations. Request a free demo today.