Encrypt data at rest and in motion to ensure cyberattackers never gain access to your sensitive data or proprietary information.
Data Encryption Is Your Last Line of Defense Against Security Threats
Sophisticated cyberattacks are becoming more frequent every year, and the consequences can have a lasting effect on your organization. When you factor in the exposure of valuable intellectual property, customer lawsuits, and the long-term effects of negative publicity, a data breach can jeopardize the value of your business. But businesses that encrypt their sensitive data can greatly reduce their risks.
Data encryption is an additional layer of security that can greatly reduce the impact of a breach. Encryption ensures that any data accessed by unauthorized persons is unusable, protecting your most confidential assets including credit card numbers, PII data, PHI, and your company's intellectual property. This means no customer lawsuits, no PR crisis, and no danger of proprietary information falling into the wrong hands.
How Does Encryption Work?
Encryption uses algorithms to translate your information from plaintext into a secret code known as ciphertext, which is unusable by unauthorized users.
To return the information to a readable format (decryption), a person needs the proper key. With symmetric-key encryption, the same key is used to encrypt and decrypt the data. Asymmetric encryption uses two different keys: a public key and a private key. The public key can be shared with anyone to encrypt information, while the private one must be kept secret for decryption purposes.
Meeting SOX, HIPAA, and PCI DSS Requirements with Encryption
File encryption isn’t just a security control that’s “nice to have.” For many businesses, it’s a requirement, and the failure to encrypt data could lead to failed audits and fines.
The Payment Card Industry Data Security Standard (PCI DSS) was the first major security mandate to explicitly require encryption. To stay PCI compliant, businesses must encrypt credit cardholder data to ensure the data is unreadable in the event of a breach. This requirement applies to data at rest and in motion.
HIPAA—the U.S. law governing health insurance and healthcare information—requires electronically protected health information (ePHI) to be secured through encryption. This law applies to health insurance companies, hospitals, healthcare providers, and many other businesses operating in the healthcare industry.
Another U.S. federal law, Sarbanes-Oxley (SOX), applies to publicly traded companies and is designed to prevent fraud and ensure corporate accountability. While SOX doesn’t explicitly require encryption, encrypting your data is a highly effective way to prevent unauthorized parties—even your own users—from reading and changing data.
Safe harbor provisions are another compelling reason to encrypt your files. Today, nearly every state in the U.S. has a law requiring companies to notify customers if their data was exposed in a breach. These breach notifications can be time-consuming and costly, but most states also include a safe harbor for encrypted data. This means breach notifications are not required when the data affected was encrypted.
Should I Encrypt Data at Rest or in Transit? Or Both?
Data in transit, also known as data in motion, is data actively moving from one location to another, either across the internet, through a network, or from a local storage device to cloud storage. Data at rest is simply data that is stored on disk or other media.
Some security experts believe data in motion is most vulnerable, while others argue that data at rest is at greater risk. Attackers grow more sophisticated every day, so this data is at risk in both states. Ultimately, any business that needs to keep data private should be utilizing encryption wherever their confidential data is stored or transmitted.
Prevent Cybercriminals from Exploiting Private Information
Encrypting data renders it meaningless to unauthorized users.
Comply with Security Mandates
Meet PCI, HIPAA, and SOX requirements for data protection.
Protect Sensitive Data
Keep private information out of the hands of cyberattackers.
Establish a Multi-Layered Defense
Implement a robust security strategy that’s strong enough for today’s threats.
Encryption on IBM i Simplified On-Demand Webinar
Compare Encryption Solutions
Encrypt Data at Rest
Encrypt Data in Motion
|Powertech Encryption for IBM i||GoAnywhere®|
|Platform||IBM i||IBM i, AIX, Linux, Windows|