Would you like to be called free of charge by one of our advisors?

Our advisors are available from Monday to Friday at 9am to 12am and at 2pm to 6pm

Thank you, our adivisors will calling you.

Powertech Encryption

Encryption and Key Management Software for IBM i

Request documentation Contact-us

Protect sensitive IBM i data with encryption, key management, and auditing

Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management, and auditing. Our complete encryption suite allows organizations to encrypt database fields, backups, and IFS files quickly and effectively with its intuitive screens and proven technology. Organizations around the world depend on Powertech Encryption to help secure confidential information data on IBM i (iSeries), as well as data from distributed systems, from both external hackers and unauthorized internal users.

Functions

Centralization

Centralizes key management on a single server

Tokenisation

Support for tokenization of data from various systems including IBM i, Windows, Linux, AIX, etc.

Connectivity

Provides remote connections to token functions via the secure HTTPS protocol

Identification

Auto-assign token identifiers from the token central server

Encryption

Encrypts and stores tokenized data in physical DB2 files

Security

Secure data by user profile, Group profile and/or authorization lists

Alerting

Provides centralized audit logs and alert messages

Key features

  • Automatic encryption of IBM i database fields without application changes
  • Encryption of IBM i libraries/objects (backup encryption) and IFS files
  • Powertech Encryption provides native backup (tape) encryption for IBM i customers
  • Key creation, management and protection through integrated Key Manager
  • Tokenization, encryption and storage of data from various systems (IBM i, Windows, Linux, Unix, etc.)
  • Generation of audit trails and complete reports

Field encryption

Automatically encrypt sensitive database fields and columns using strong encryption AES or TDES without making changes to your application programs for data encryption. Access to data can be tightly controlled at the feld/user level and only authorized users will have the ability to decrypt data and gain access to the full or masked values. Decryption of any data can be fully audited in Powertech Encryption, which will log the user id, date, time, job information and key utilized.

Audit trail

Powertech Encryption includes a complete audit to meet the most stringent security requirements. Audit log entries are generated for various critical events. These audit log entries can be displayed and printed using various selection criteria, including a date/time range, user type, and audit type. Alert messages can also be sent to QSYSOPR, QAUDJRN, email and SYSLOG.

Encryption of IFS partitions

Powertech Encryption uses strong AES encryption to encrypt and decrypt files and folders on the integrated file system (IFS). All types of IFS stream files can be encrypted, including text, PDF, JPG, TIF, CSV and XLS files. Encryption of IFS files can be fully automatic for designated folders or can be managed by the user using Powertech Encryption commands that can be entered on the IBM i command line, placed in CL programs, embedded in BRMS and used in IBM i task schedulers.

Tokenization

Tokenization must be considered when sensitive data is stored on multiple systems in an organization. Tokenization is the process of replacing sensitive data with unique identification numbers (e.g. tokens) and storing the original data on a central server, usually in encrypted form. By centralizing sensitive data on a single system, segmentation can help counter hackers and reduce the scope of compliance audits, such as PCI.

Backup Encryption

Powertech Encryption provides native backup (tape) encryption for IBM i customers that wish to protect their sensitive backup media including entire libraries, objects and/or IFS files. Backups can be protected using Keys from Powertech Encryption’s Key Management System to provide strong security. Powertech Encryption’s backup and restore commands can be entered on the IBM i command line, placed in CL programs, incorporated in BRMS and used in job schedulers on the IBM i, automating the process of encrypting your backups.

Key Management

Powertech Encryption includes an advanced Key Management system which resides natively on the IBM i and is seamlessly integrated with Powertech Encryption’s policy controls, encryption functions and auditing facilities to provide a comprehensive data protection solution. Together with the integrated security on IBM i, organizations can strictly control access to Key maintenance/usage activities and meet compliance requirements. Powertech Encryption also provides interfaces for securely sharing Keys with other systems such as point-of-sale (POS) systems, Windows, Linux and AIX.

Product Datasheets

We remain at your disposal for more information

Request documentation Contact-us