iSecurity PGP Encryption for IBM i
World Standard for File Encryption

These days, everyone and everything is interconnected on the web, so security breaches easily become widespread. Transferring files between devices multiplies the risk of data being exposed to unauthorized entities. So files must be encrypted from source to target-oftentimes between different platforms, environments and devices- with the highest level of efficiency and accountability.
The world has chosen PGP to be the standard for file encryption requirement for industry regulations.
What's PGP Encryption used for?
iSecurity PGP for File Encryption solution allows users to encrypt IBM i files using a public encryption key.
Advantages:
- Supports multiple encryption algorithms, including AES and TDES
- Only users possessing the correct private key can decrypt and open the protected files.
- Built to support also multi-site, multi-LPAR organizations
- Key management capabilities, enabling users to create, import, and export the keys needed to encrypt and decrypt files

PGP encryption uses a combination of encryption methodologies such as hashing, data compression, symmetric-key cryptography and public key cryptography to keep data secure.
iSecurity PGP Encryption at a Glance
Compliance and Encryption
Files can be automatically encrypted and transmitted to recipients. Received files can be automatically decrypted and processed by user applications. This process can be used with any type of Native or IFS file or directory.
Raz-Lee’s PGP implementation provides a wide set of CL commands which cover virtually all aspects of PGP, including:
encryption, decryption, signing, identify fingerprints, creating key pairs, import, export, keeping key stores and more.
Our Solution
iSecurity PGP Encryption allows you to encrypt files that are transferred to the cloud or to encrypt files on the cloud that are to be transferred to on-premises.
CLOUD Advantages:
- Files can be automatically encrypted and transmitted to recipients.
- Received files can be automatically decrypted by user applications.
Related Information
Key Features
- Helps protect sensitive IBM i data.
- Secures e-mail communications with automatic, policy-based message encryption.
- Supports regulatory compliance requirements.
- Prevents the need for manual processes to first transfer files to a PC and then encrypt them.
- Ensures real end-to-end encrypted transmissions.
Related Products
Antivirus
IFS virus checks and scans, Native Object Integrity checks, alert by email and by Syslog.
Anti-Ransomware
Detects and prevents attacks by WannaCry, Petya and other similar malware.
Field Encryption
Column-level field encryption based on IBM’s FIELDPROC, Encryption & Tokenization.
Firewall
Network security, controlling Exit Points, Open DB’s and SSH. Rule Wizards and graphical BI.