Would you like to be called free of charge by one of our advisors?

Our advisors are available from Monday to Friday at 9am to 12am and at 2pm to 6pm

Thank you, our adivisors will calling you.


📢 New MFT Reporting

Discover the evaluation and ranking of all MFT software by IT professionals.

Learn more
Ask demo
fr / en /
Ask demo
fr / en /

Powertech Encryption

Encryption and Key Management Software for IBM i

Download datasheet Contact us

Protect sensitive IBM i data with encryption, key management, and auditing

Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management, and auditing. Our complete encryption suite allows organizations to encrypt database fields, backups, and IFS files quickly and effectively with its intuitive screens and proven technology. Organizations around the world depend on Powertech Encryption to help secure confidential information data on IBM i (iSeries), as well as data from distributed systems, from both external hackers and unauthorized internal users.



Centralizes key management on a single server


Support for tokenization of data from various systems including IBM i, Windows, Linux, AIX, etc.


Provides remote connections to token functions via the secure HTTPS protocol


Auto-assign token identifiers from the token central server


Encrypts and stores tokenized data in physical DB2 files


Secure data by user profile, Group profile and/or authorization lists


Provides centralized audit logs and alert messages

Field encryption

Automatically encrypt sensitive database fields and columns using strong encryption AES or TDES without making changes to your application programs for data encryption. Access to data can be tightly controlled at the feld/user level and only authorized users will have the ability to decrypt data and gain access to the full or masked values. Decryption of any data can be fully audited in Powertech Encryption, which will log the user id, date, time, job information and key utilized.

Audit trail

Powertech Encryption includes a complete audit to meet the most stringent security requirements. Audit log entries are generated for various critical events. These audit log entries can be displayed and printed using various selection criteria, including a date/time range, user type, and audit type. Alert messages can also be sent to QSYSOPR, QAUDJRN, email and SYSLOG.

Encryption of IFS partitions

Powertech Encryption uses strong AES encryption to encrypt and decrypt files and folders on the integrated file system (IFS). All types of IFS stream files can be encrypted, including text, PDF, JPG, TIF, CSV and XLS files. Encryption of IFS files can be fully automatic for designated folders or can be managed by the user using Powertech Encryption commands that can be entered on the IBM i command line, placed in CL programs, embedded in BRMS and used in IBM i task schedulers.


Tokenization must be considered when sensitive data is stored on multiple systems in an organization. Tokenization is the process of replacing sensitive data with unique identification numbers (e.g. tokens) and storing the original data on a central server, usually in encrypted form. By centralizing sensitive data on a single system, segmentation can help counter hackers and reduce the scope of compliance audits, such as PCI.

Key Management

Powertech Encryption includes an advanced Key Management system which resides natively on the IBM i and is seamlessly integrated with Powertech Encryption’s policy controls, encryption functions and auditing facilities to provide a comprehensive data protection solution. Together with the integrated security on IBM i, organizations can strictly control access to Key maintenance/usage activities and meet compliance requirements. Powertech Encryption also provides interfaces for securely sharing Keys with other systems such as point-of-sale (POS) systems, Windows, Linux and AIX.

Key features

  • Automatic encryption of IBM i database fields without application changes
  • Encryption of IBM i libraries/objects (backup encryption) and IFS files
  • Powertech Encryption provides native backup (tape) encryption for IBM i customers
  • Key creation, management and protection through integrated Key Manager
  • Tokenization, encryption and storage of data from various systems (IBM i, Windows, Linux, Unix, etc.)
  • Generation of audit trails and complete reports

Ask a quote

We remain at your disposal for more information

Request documentation Contact-us