Contact us for Pricing or Questions:      (888) 682-5335          *We Ship Worldwide
Search Products
AS400 Software iSeries Field Encryption Scrambling and Masking Quick to implement encryption, masking and scrambling for IBM iSeries DB2 database fields utilizing .. Product #: iSeries-Encryption

iSeries AS400 Encryption for IBM DB2 database field column row

Brand: AS400 Software
Model Number: iSeries-Encryption

iSeries Encryption, Masking and Scrambling module utilizes IBM FIELDPROC exit program which is a native AS400 OS400 feature. This solution provides an intuitive point and click GUI interface that walks you through the encryption of DB2 database fields in a couple minutes using 5 simple steps. Encryption adds a critical layer for sensitive data, and is required for many compliance regulations. Even when encryption is not mandatory, companies should use common sense when determining when data should be protected with encryption. The encryption, masking and scrambling feature is an extension of the iSeries Enterprise Security suite, and can be purchased separately. Our encryption solution requires no source code changes and works no matter how your iSeries data is accessed or where it resides, such as third party applications, replication, backups, journaling, printing or any other means used to store or access your data.

iSeries Encryption, Scrambling and Masking features for DB2 Database

Encryption: encrypts both numeric and alphanumeric fields in DB2 database using an encryption algorithm of your choice (AES 128, AES 192, AES 256, TDES 8, TDES 16, TDES 24, DES). Both alphanumeric and numeric fields can be encrypted. Unauthorized users will not be able to see the encrypted data, regardless of where your data is stored or how it is accessed. Using universally accepted PCI approved encryption algorithm standards.

Field Security: prevents updating fields while allowing read access unrestricted.

Masking: replaces all or selected positions of a field on the fly, before displaying the data to the requester. Changes to field take place at the time of the record read, and the DB2 field remains unchanged.

Scrambling: applies an arithmetic function on all or specified positions of a field on the fly, before displaying the data to the requester. Changes to field take place at the time of the record read, and the DB2 field remains unchanged.

Full or partial masks of fields can be applied on any kind of database field. For numeric fields, you have the option to scramble data, which is ideal for data used in development and testing applications.

RCAC Field Masking: performs field masking using Row Column Access Control feature available in OS400 V7R3 or later.

IFS File Encryption: encrypts any object in the IFS.

Save File Encryption: replaces a SAVF object with an encrypted file, and cannot be used on any system until safe file is unencrypted. Good for encrypting files for backup.

Key Management: flexible key management, providing two-tier encryption requiring master keys in order to generate data keys, ensuring strict separation between those who generate keys and those who use them, and keys can also be encrypted. Encryption keys can be stored on IBM iSeries or on a remote server. Encryption keys are assigned to users or groups of users based on roles defined by the administrator. An unlimited number of encryption keys can be created, and a different encryption key can be used for every field. Encryption key strings (characters used by algorithm), can be entered manually or randomly generated so that even the administrator does not know the encryption key.

User-defined Access: allows for decrypting data for groups of users, without the need for application level detail.

High Availability Compatibility: Encryption works in high availability environments without any special measures being taken. Backups and replicated databases will be identical to the production system and will contain the master and data keys needed to encrypt and decrypt the data.

Back-Up Encryption: object encryption for backups, providing ability to encrypt and save entire libraries as well as individual objects. A series of commands allow easy integration of object encryption into back-up processes. Organizations backing their data up to tape, now have an easy way to make sure the data cannot be read by anyone who is not authorized in case their tapes end up in the wrong hands.

Data Protection: Encryption adds a vital layer to the security of an organization's sensitive data. Enforcive provides GUI-Managed File and Field Level Security, preventing even Power Users from accessing data in fields that require limited access.

Application Independence: Field Encryption has been engineered to minimize impact on mission critical applications that could be affected by a encrypting and decrypting processes. Existing database file structures remain unchanged. Organizations will typically not require any program changes.

Compliance: Requirements such as the PCI Data Security Standard (requirement 3) specifies protection of stored cardholder data.  Enterprise Security provides the ultimate answer to that requirement by a foolproof encryption and decryption mechanism using universally accepted PCI approved encryption algorithm standards.

Reports: With the existing features provided by the Enterprise Security product including Exit Point Management, Object Authority Management and IP Packet Filtering, Enforcive offers the ultimate tool for data protection.

Request a Trial

Please let us know your name.
Invalid Input
Please write a subject for your message.
Please let us know your email address.
Please let us know your message.
Invalid Input
Invalid Input