Welcome to Powertech Encryption for IBM i

Powertech Encryption for IBM i for IBM i allows organizations to implement encryption quickly using intuitive screens and commands, while providing a high degree of protection. Every effort has been made in Powertech Encryption for IBM i to minimize the application changes needed, allowing an organization to implement encryption successfully for less time and money.

NOTE: Data encryption has traditionally been very difficult and time-consuming to implement. In the past, major application changes were required to expand database field sizes and implement complicated API calls to encrypt/decrypt data.  Additionally, organizations were not meeting stringent Key Management requirements by not properly securing and controlling their encryption Keys.

Powertech Encryption for IBM i Features

Powertech Encryption for IBM i includes the comprehensive features needed to satisfy stringent requirements for encryption and key management.  The primary capabilities of Powertech Encryption for IBM i are:

  • Automated encryption of database fields within IBM i DB2 database files and tables
  • Support for automatic, transparent field encryption through use of DB2 Field Procedures
  • Decryption of fields as full values or masked values, based on authorization lists
  • Encryption of IBM i files, objects and libraries (backup encryption)
  • Encryption of files located on the Integrated File System (IFS)
  • Tokenization, encryption and storage of data from remote systems (IBM i, Windows, Linux, etc.)
  • Integrated Key Management with Role-based administration
  • Ability to integrate with enterprise key managers from other vendors
  • Compliance with Advanced Encryption Standard (AES) and Data Encryption Standard (TDES)
  • Intuitive IBM i menus and commands with on-line help text
  • Program calls and ILE procedures (APIs) for decrypting data within native applications
  • Stored procedures and SQL functions for decrypting data through SQL
  • Restrict programmers from accessing decrypted values, even if they have *ALLOBJ authority
  • Security alert messages to email addresses, message queues, SYSLOG and journals
  • Comprehensive audit trails and reporting

Instructions

Before encrypting production data with Powertech Encryption for IBM i, it is important for you to have a full understanding of the product and how to implement good key management practices.  This will help ensure that your data is properly protected and can be decrypted only by authorized users. 

Please review this manual for complete details on how to use Powertech Encryption for IBM i’s commands and screens. If you are a developer, also refer to the Programmer’s Guide for instructions on how to use Powertech Encryption for IBM i’s procedures and programs (APIs) for encrypting/decrypting data from within your applications.

View as PDF

 

3.64 | 202109071215 | September, 2021