• Data Sheet

Assure Encryption

Customers, business partners and employees trust you to protect their confidential information from unauthorised access and theft. Any breach of that data would negatively impact relationships and your business’ reputation.

In addition to preventing theft of data by criminal intruders, internal staff, contractors and business partners should only be allowed to see the specific data to which they are authorized.

In fact, industry and state regulations such as PCI-DSS, HIPAA, GDPR and more mandate encryption of personally identifiable information (PII), payment card information (PCI) and personal health information (PHI). 

In addition to data encryption, tokenisation may also be used to replace sensitive data with replacement (token) values. Tokenisation removes sensitive data from the production server, removing that server from the scope of compliance. 

Assure Encryption, a feature of Assure Security and part of the Assure Data Privacy feature bundle, is trusted by organisations worldwide to protect their private data. It encrypts data anywhere it resides on the IBM i, including database fields, backup tapes, Save files, IFS files and more. The solution is optimised for performance and is the only NIST-validated AES database encryption solution for IBM i. Built-in masking, logging, and tokenisation capabilities make Assure Encryption the clear choice for privacy of IBM i data at rest.

To learn more, download your copy of the full data sheet.

Share this resource:
LinkedIn
Facebook
X
WhatsApp
Email

Related posts

Automated, fast, accurate, sensitive data mapping & assessment as-a-service.
Given the increasing frequency of cyber attacks, it is essential to regularly conduct security risk assessments as part of a comprehensive IT security program.
The days when the IBM i was an isolated platform communicating through proprietary protocols are gone. Modern IBM i systems are highly connected through standard network and open-source protocols. This opens a wide variety of access points to the worldwide hacker community, who recognise the high value of data residing on an IBM i.
Having too many powerful user profiles leaves the security of your IBM i system and data exposed. In fact, security and compliance auditors prefer that IBM i users be given only the authorities required to perform their jobs, and that they be granted additional authority only when needed and only for the time required.