Data is the new currency for businesses so protecting it is paramount to protecting the organizations using it. With PK Encryption, powered by the merger of Dataguise and PKWARE technologies, businesses can encrypt files and databases, as well as data that is being transmitted, by converting usable data into an unreadable form and providing decryption to those with proper access to reverse the process.
- Persistent File Encryption – Apply protection to the data itself for hundreds of file types so sensitive information stays encrypted no matter where it is stored, shared, or copied.
- Format Preserving Encryption – Encrypt data while preserving the formatting and length of the original data.
- Transparent Data Encryption – Protect data at rest on enterprise servers and automatically encrypt/decrypt as data is read/written across the network.
- Dynamic Data Encryption – Encrypt the data while it’s in motion, especially for migration or an ETL process/
- Single, Automated Workflow – Invoke discovery processes that automate encryption workflows
- Controlled Encryption – Provide mechanisms for decrypting and discovering data that is encrypted from uncontrolled third-party applications.
- Extensive Protection Capabilities – Automate policy-based encryption for sensitive data in TXT, AVRO, Sequence, RC, ORC, JSON, XML file formats, and more.
- Inside and Outside Control – Sensitive data remains safe even when it’s sent to users outside the organization.
- Endpoint, Cloud and On-Prem – Encrypt data at endpoints such as laptops, desktops, and mobile devices, as well as in large-scale cloud storage systems, database systems, and file servers.
- Element and Column Level Encryption – Encrypt sensitive elements in unstructured files and cloud storage objects, and sensitive columns in databases and structured files.
- Email Encryption – Seamlessly and securely send end-to-end encrypted emails internally and externally while preserving user workflows.
- IBM Z and IBM I Leveraged Crypto Hardware – Extend IBM Pervasive Encryption® and leverage IBM CPACF, zIIP and zEDC for IBM Z and FIPS-140 compliant PCIe3 Crypto Coprocessor for IBM I.