Welcome to Powertech Encryption for IBM i
Powertech Encryption for IBM i allows organizations to implement encryption quickly using intuitive screens and commands, while providing a high degree of protection. Every effort has been made in Powertech Encryption for IBM i to minimize the application changes needed, allowing an organization to implement encryption successfully for less time and money.
Powertech Encryption for IBM i Features
Powertech Encryption for IBM i includes the comprehensive features needed to satisfy stringent requirements for encryption and key management. The primary capabilities of Powertech Encryption for IBM i are:
- Automated encryption of database fields within IBM i DB2 database files and tables
- Support for automatic, transparent field encryption through use of DB2 Field Procedures
- Decryption of fields as full values or masked values, based on authorization lists
- Encryption of IBM i files, objects and libraries (backup encryption)
- Encryption of files located on the Integrated File System (IFS)
- Tokenization, encryption and storage of data from remote systems (IBM i, Windows, Linux, etc.)
- Integrated Key Management with Role-based administration
- Ability to integrate with enterprise key managers from other vendors
- Compliance with Advanced Encryption Standard (AES) and Data Encryption Standard (TDES)
- Intuitive IBM i menus and commands with on-line help text
- Program calls and ILE procedures (APIs) for decrypting data within native applications
- Stored procedures and SQL functions for decrypting data through SQL
- Restrict programmers from accessing decrypted values, even if they have *ALLOBJ authority
- Security alert messages to email addresses, message queues, SYSLOG and journals
- Comprehensive audit trails and reporting
Instructions
Before encrypting production data with Powertech Encryption for IBM i, it is important for you to have a full understanding of the product and how to implement good key management practices. This will help ensure that your data is properly protected and can be decrypted only by authorized users.
Review this manual for complete details on how to use Powertech Encryption for IBM i’s commands and screens. On most command screens, press F9 to display additional fields. If you are a developer, also refer to the Programmers Guide for instructions on how to use Powertech Encryption for IBM i’s procedures and programs (APIs) for encrypting/decrypting data from within your applications. If needed, contact Powertech Support for the Programmers Guide.