Encryption and Key Management Software for IBM iDownload datasheet Contact us
Thank you, our adivisors will calling you.
💻 SFTP, or MFT: that is the question
It brings up an interesting choice. By nature, SFTP and MFT solutions both work to protect data in transit. So what’s the difference? Is one better than the other for your organization?Read the news
Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management, and auditing. Our complete encryption suite allows organizations to encrypt database fields, backups, and IFS files quickly and effectively with its intuitive screens and proven technology. Organizations around the world depend on Powertech Encryption to help secure confidential information data on IBM i (iSeries), as well as data from distributed systems, from both external hackers and unauthorized internal users.
Centralizes key management on a single server
Support for tokenization of data from various systems including IBM i, Windows, Linux, AIX, etc.
Provides remote connections to token functions via the secure HTTPS protocol
Auto-assign token identifiers from the token central server
Encrypts and stores tokenized data in physical DB2 files
Secure data by user profile, Group profile and/or authorization lists
Provides centralized audit logs and alert messages
Automatically encrypt sensitive database fields and columns using strong encryption AES or TDES without making changes to your application programs for data encryption. Access to data can be tightly controlled at the feld/user level and only authorized users will have the ability to decrypt data and gain access to the full or masked values. Decryption of any data can be fully audited in Powertech Encryption, which will log the user id, date, time, job information and key utilized.
Powertech Encryption includes a complete audit to meet the most stringent security requirements. Audit log entries are generated for various critical events. These audit log entries can be displayed and printed using various selection criteria, including a date/time range, user type, and audit type. Alert messages can also be sent to QSYSOPR, QAUDJRN, email and SYSLOG.
Powertech Encryption uses strong AES encryption to encrypt and decrypt files and folders on the integrated file system (IFS). All types of IFS stream files can be encrypted, including text, PDF, JPG, TIF, CSV and XLS files. Encryption of IFS files can be fully automatic for designated folders or can be managed by the user using Powertech Encryption commands that can be entered on the IBM i command line, placed in CL programs, embedded in BRMS and used in IBM i task schedulers.
Tokenization must be considered when sensitive data is stored on multiple systems in an organization. Tokenization is the process of replacing sensitive data with unique identification numbers (e.g. tokens) and storing the original data on a central server, usually in encrypted form. By centralizing sensitive data on a single system, segmentation can help counter hackers and reduce the scope of compliance audits, such as PCI.
Powertech Encryption includes an advanced Key Management system which resides natively on the IBM i and is seamlessly integrated with Powertech Encryption’s policy controls, encryption functions and auditing facilities to provide a comprehensive data protection solution. Together with the integrated security on IBM i, organizations can strictly control access to Key maintenance/usage activities and meet compliance requirements. Powertech Encryption also provides interfaces for securely sharing Keys with other systems such as point-of-sale (POS) systems, Windows, Linux and AIX.