Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Schedule a demo today.
Satisfy Stringent Requirements for Encryption and Key Management
Powertech Encryption for IBM i will help your organization meet compliance mandates through its integrated key management solution, and strong IBM i field encryption and backup encryption features. Powertech Encryption for IBM i utilizes AES and TDES encryption algorithms, both of which follow standard (non-proprietary)...
Ad hoc queries and reports are the bane of many IT departments. The need to churn out frequent, one-off, "must have" data queries for users can be a significant drain on developers' time. Users can't be blamed for the numerous impromptu requests. Customer service, continuous improvement, and the maintenance of competitive advantage demand that business people regularly look at data in innovative...
Do your users have ODBC connections to your IBM i environment through tools like Microsoft Access or Microsoft Excel?
Unprotected ODBC connections make it easy for people to access unauthorized data or accidentally change and delete database records.
Surveyor/400 minimizes the risk of unauthorized access by providing connections to your IBM i data while maintaining database security and inte...
If you perform development for the IBM i, you will discover that Surveyor/400 provides a wide variety of benefits to make your job easier. Listed below is just a sample of some of the work you can easily perform using Surveyor/400:
Explore your IBM i through a drill-down tree interface similar to Windows Explorer
View extensive details on any object through an intuitive multi-tabbed panel
...
Robin Tatam has fielded quite a few questions about how to encrypt IBM i data. In this quick video, he outlines your options and explains field procedures (FieldProcs).
Learn your options for encrypting IBM i data.
Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property.
Encryption is widely recognized as the most effective way to ensure private...
PCI, HIPAA, GLBA, Sarbanes Oxley, and state privacy laws put pressure on organizations to properly protect sensitive data, such as credit card numbers, Social Security numbers, and bank account numbers.
To provide the best protection for sensitive data stored on your system, you should seriously consider encryption. But first you need to find where this data is stored.
Find Database Fields ...
If your organization is thinking about using (or is using) IBM's Cryptographic APIs (e.g. QC3ENCDT, Qc3EncryptData) for encrypting database fields, then this article is for you.
Disk drive encryption may help you comply with PCI DSS, but you must follow strict requirements. Additionally, relying solely on disk drive encryption for data protection has serious potential risks that you should be aware of.
Hershey Entertainment & Resorts is a privately held company located in the tourist center of Hershey, Pennsylvania, and has entertainment, resort and commercial divisions. Earlier this year, Hershey learned that because the entertainment and resort operations accept credit cards for payment, they needed the information stored by their box office ticketing and reservations applications to be...