Logo
Sign in
Product Logo
iSecurity Field EncryptionRaz-Lee

iSecurity Field Encryption protects sensitive data on IBM i servers without modifying software. It ensures compliance with regulations like PCI-DSS, HIPAA, and GDPR, presenting data in clear text, masked, scrambled, or hidden as needed.

DS-Encryption-FIELD.pdf
iSecurity-…tion-FIELD.pdf
Product details

iSecurity Field Encryption

The iSecurity Field Encryption solution, part of the iSecurity suite, allows you to fully protect all sensitive data without modifying your software. A change that is done externally without changing the Level-Check of your file (i.e. Files remain intact), but is reflected in:

  • Your programs, regardless of whether they use SQL or Native IO
  • Any system utility including FTP, Query, DFU
  • DB-Journal iSecurity Encryption was designed after the FIELDPROC announcement and does not need to have backward capability with outdated technology – providing efficiency and simplicity.

Key features

Compliance Check

Encryption is also the way to ensure that sensitive data is presented in the way that suits the user, and the circumstances. Those who are entitled to access your data will see the data in clear text, masked, scrambled, or not see it at all, as appropriate. PCI-DSS, HIPAA, GDPR and other regulatory bodies require encrypting sensitive parts of the data.

Tokenization

Tokenization is a non-mathematical approach that replaces sensitive data with non-sensitive substitutes without altering the type or length of data. This is an important distinction from encryption because changes in data length and type can render information unreadable in intermediate systems such as databases. iSecurity Field Encryption Solution is based on IBM Native APIs and supports both Encryption and Tokenization.

Key Manager

In a multi-site environment, a single key manager can be set to support all sites, centralizing all key-related activity.

  • Key Manager, Data Manager, and Token Manager can optionally be installed on different IBM i LPARs.
  • KEK (Key encrypting Keys) as well as Data Keys can be automatically changed, unattended.