Encryption Key Management Software

Key Management for Encryption and PCI Compliance

Media
Image
key management for IBM i
Text

Powertech Encryption for IBM i includes an advanced Key Management system which resides natively on IBM i. This Key Management system is seamlessly integrated with Powertech Encryption’s policy controls, encryption functions and auditing facilities to provide a comprehensive data protection solution.

Together with the integrated security on IBM i, organizations can strictly control access to key maintenance and usage activities to meet stringent compliance requirements such as PCI DSS. The encryption keys can either reside on the same IBM i system or partition as the data or can be managed and stored on a different system or partition.

Secure IBM i Encryption Keys

Text

Powertech Encryption provides a secure multi-level architecture to protect data encryption keys on IBM i.

 

Image
Key Management Encryption

Key Features

Policy Settings

Establish policy settings on how Data Encryption Keys can be created and utilized for compliance requirements (e.g. dual control, separation of duties)

Strong Key Values

Randomly generate strong Key values up to 256 bits in length

User-Based Authorization

Control which users are authorized to create and manage Keys. Access can be controlled by user profiles, group profile and/or authorization lists.

Integration Options

Option to import or link to Data Encryption Keys from other Key Management Systems, including Vormetric and Safenet

Secure Interfaces

Powertech Encryption for IBM i provides interfaces for securely sharing Keys with other systems such as point-of-sale (POS) systems, Windows, Linux and AIX.

Key Protection

Protect Data Encryption Keys using Master Encryption Keys and restrict the retrieval of the actual Data Encryption Key values

Dual Control

Protect the recreation of a Master Encryption Key by requiring passphrases from 2 to 8 users

Key Stores

Organize Data Encryption Keys into one or more Key Stores

Auditing

Produce detailed audit logs on all Key management activities

Get Started with IBM i Encryption

Find out how strong encryption, tokenization, integrated key management and auditing can help protect your sensitive IBM i data and meet compliance regulations. Request a free demo today.

REQUEST MY DEMO