Search
Close this search box.

iSecurity Field Encryption

The iSecurity Field Encryption solution, part of the iSecurity suite, allows you to fully protect all sensitive data without modifying your software. A change that is done externally without changing the Level-Check of your file (i.e. Files remain intact), but is reflected in:

  • Your programs, regardless of whether they use SQL or Native IO
  • Any system utility including FTP, Query, DFU
  • DB-Journal

 

iSecurity Encryption was designed after the FIELDPROC announcement and does not need to have backward capability with outdated technology – providing efficiency and simplicity.

Key Features

Encryption is also the way to ensure that sensitive data is presented in the way that suits the user, and the circumstances.

Those who are entitled to access your data will see the data in clear text, masked, scrambled, or not see it at all, as appropriate. PCI-DSS, HIPAA, GDPR and other regulatory bodies require encrypting sensitive parts of the data.

Tokenization is a non-mathematical approach that replaces sensitive data with non-sensitive substitutes without altering the type or length of data.

This is an important distinction from encryption because changes in data length and type can render information unreadable in intermediate systems such as databases.

iSecurity Field Encryption Solution is based on IBM Native APIs and supports both Encryption and Tokenization.

In a multi-site environment, a single key manager can be set to support all sites, centralizing all key-related activity.

  • Key Manager, Data Manager, and Token Manager can optionally be installed on different IBM i LPARs.
  • KEK (Key encrypting Keys) as well as Data Keys can be automatically changed, unattended.

Based on Clients Experience

iSecurity Encryption

Business Vertical: Finance & Banking.

Need: Cyber Security Regulation Compliance for Financial entities.

“Not many products in the security field that fascinated me, but I have to admit this one is unique, it does exactly what is needed, with a really fast configuration and the files are never blocked. Best encryption option for the IBM i in the market.”

This financial institution needs to comply with PCI-DSS and ensure the confidentiality of the information about clients and their associated payment methods. 

Resources

Download Presentation

Download Datasheet

Read HTML Manual

Read Release News

Request Demo

Please fill the following Form, our Sales Representatives will contact you as soon as possible.