
Powertech Encryption for IBM i includes an advanced Key Management system which resides natively on IBM i. This Key Management system is seamlessly integrated with Powertech Encryption’s policy controls, encryption functions and auditing facilities to provide a comprehensive data protection solution.
Together with the integrated security on IBM i, organizations can strictly control access to key maintenance and usage activities to meet stringent compliance requirements such as PCI DSS. The encryption keys can either reside on the same IBM i system or partition as the data or can be managed and stored on a different system or partition.
Secure IBM i Encryption Keys
Powertech Encryption provides a secure multi-level architecture to protect data encryption keys on IBM i.

Key Features
Policy Settings
Establish policy settings on how Data Encryption Keys can be created and utilized for compliance requirements (e.g. dual control, separation of duties)
Strong Key Values
Randomly generate strong Key values up to 256 bits in length
User-Based Authorization
Control which users are authorized to create and manage Keys. Access can be controlled by user profiles, group profile and/or authorization lists.
Integration Options
Option to import or link to Data Encryption Keys from other Key Management Systems, including Vormetric and Safenet
Secure Interfaces
Powertech Encryption for IBM i provides interfaces for securely sharing Keys with other systems such as point-of-sale (POS) systems, Windows, Linux and AIX.
Key Protection
Protect Data Encryption Keys using Master Encryption Keys and restrict the retrieval of the actual Data Encryption Key values
Dual Control
Protect the recreation of a Master Encryption Key by requiring passphrases from 2 to 8 users
Key Stores
Organize Data Encryption Keys into one or more Key Stores
Auditing
Produce detailed audit logs on all Key management activities
Get Started with IBM i Encryption
Find out how strong encryption, tokenization, integrated key management and auditing can help protect your sensitive IBM i data and meet compliance regulations. Request a free demo today.