Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Keeper Security Reviews & Ratings
    1,623 Ratings
    Company Website
  • CLEAR Reviews & Ratings
    1 Rating
    Company Website
  • DriveStrike Reviews & Ratings
    23 Ratings
    Company Website
  • Satori Reviews & Ratings
    86 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,052 Ratings
    Company Website
  • QuantaStor Reviews & Ratings
    6 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • Files.com Reviews & Ratings
    239 Ratings
    Company Website
  • Comet Backup Reviews & Ratings
    224 Ratings
    Company Website
  • NordVPN Reviews & Ratings
    1,701 Ratings
    Company Website

What is Powertech Encryption for IBM i?

Powertech Encryption for IBM i provides a strong safeguard for sensitive data through advanced encryption, tokenization, key management, and auditing capabilities. By offering easy-to-use interfaces and dependable technology, this solution allows organizations to quickly and effectively encrypt database fields, backups, and IFS files. Businesses worldwide trust Powertech Encryption to secure confidential information on IBM i (iSeries, AS/400) as well as data from distributed systems, mitigating risks from external cyber threats and unauthorized internal access. With its thorough strategy for data protection, Powertech Encryption empowers organizations to uphold compliance and safeguard their critical assets while also adapting to evolving security challenges. This makes it an essential tool for any organization looking to enhance its data security framework.

What is Google Cloud Key Management?

Expand your global security measures by leveraging the vast infrastructure provided by Google, which simplifies the complexities of key management, including issues related to redundancy and latency. This strategy aids in fulfilling compliance requirements while facilitating easy encryption of your cloud data through software-supported encryption keys, FIPS 140-2 Level 3 certified hardware security modules (HSMs), keys supplied by customers, or an External Key Manager. By utilizing Google Cloud services, you can take advantage of customer-managed encryption keys (CMEK) to manage the encryption process across a variety of Google Cloud products, thereby bolstering your security measures with tools like Google Cloud IAM and audit logs. In addition, the cloud-based key management service allows you to effectively manage both symmetric and asymmetric cryptographic keys for your applications, aligning with your on-premises management practices. You can generate, use, rotate, and delete a diverse range of cryptographic keys, such as AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384, providing robust data protection tailored to your specific requirements. This all-encompassing solution not only strengthens your data security but also optimizes your operations, permitting your organization to concentrate on its primary functions without sacrificing safety. Ultimately, this strategic alignment of security and operational efficiency fosters a resilient environment for your business growth.

Media

Media

Integrations Supported

Eventarc
Google Cloud Analytics Hub
Google Cloud BigQuery
Google Cloud Platform
Google Compute Engine
IBM i

Integrations Supported

Eventarc
Google Cloud Analytics Hub
Google Cloud BigQuery
Google Cloud Platform
Google Compute Engine
IBM i

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Fortra

Company Location

United States

Company Website

www.fortra.com/products/database-encryption-software-ibm-i

Company Facts

Organization Name

Google

Date Founded

1998

Company Location

United States

Company Website

cloud.google.com/security-key-management

Categories and Features

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Categories and Features

Popular Alternatives

iSecurity Field Encryption Reviews & Ratings

iSecurity Field Encryption

Raz-Lee Security

Popular Alternatives

HashiCorp Vault Reviews & Ratings

HashiCorp Vault

HashiCorp
EncryptRIGHT Reviews & Ratings

EncryptRIGHT

Prime Factors