Encryption that is Optimized for Performance

Alliance AES/400 encryption APIs are capable of encrypting 1 million credit card numbers in less than one CPU second. They are highly optimized for performance, and perform up to 100X faster than equivalent IBM APIs on the IBM i platform.

Automated Encryption and Decryption on the IBM i

Alliance AES/400 supports the FIELDPROC exit point in the latest release of OS/400, v7r1.  Encrypt and decrypt fields that store data such as credit card numbers, SSN, birth dates, address, account numbers and other PII instantly without impacting applications. Alliance AES/400 FIELDPROC support will protect access to the data without changing your database or your applications. There is no need to reformat your database, or expand field sizes.

Easily Control Access to Sensitive Data with Data Masking

Automatically mask all but Last 4 or First 6 characters of credit card and social security numbers on decryption. Replace sensitive names, addresses, phone numbers, and other information with non-sensitive information. For organizations that automatically encrypt data on IBM V7R1, automatic encryption and decryption on the IBM i works for all users and applications. Administrators cannot rely on native IBM i object, or user authorities to control access to encrypted data. AES/400 helps enforce user access control with a built in data masking capability.  Security administrators can easily define the users who should have access to all of the data, and then define a default policy that masks critical data for other users.

Meet compliance requirements with NIST compliant AES encryption

Alliance AES/400 is the only NIST compliant AES database encryption solution for IBM i V7R1 & V7R2 (and all supported IBM i releases). AES/400 uses compliant 256-bit AES encryption for FIELDPROC data protection.

Externally Manage Encryption Keys for Regulatory Compliance

Meet PCI and HIPAA/HITECH compliance requirements using Townsend’s FIPS 140-2 compliant encryption key manager.  Administrators can enforce separation of duties and maintain dual control over encryption keys and the encrypted data.  Key Manager automates all encryption key management processes including key rotation, retrieval and change to save time and money.

Spooled File Report Encryption

Capture and encrypt spooled file reports automatically in real time or on a daily schedule. Encrypted reports are maintained on-line with view and reprint capability. User controls and automation are fully supported.

IFS File Encryption

Encrypt and decrypt files in any IFS directory. Files can be encrypted on the IBM i platform and decrypted on Windows and Linux.

Save File Encryption

Encrypt and decrypt any save file to an on-line archive. Encrypted save files can be moved to off-line storage or transferred to another IBM i platform for decryption.

Self-Decrypting Archives

Encrypt IBM i files to a Windows self-decrypting archive executable program. Self-decrypting archives can be transferred to a Windows user and decrypted without the requirement for additional software. This facility is ideal for the secure distribution of small files.

Compliance Logging

Compliance logging is integrated into all configuration and key management activities. Encryption and decryption logging can be implemented by policy or at the API level. Full support for IBM Security Audit journal QAUDJRN. Optional Alliance LogAgent product collects all security events for transfer to log collection server or SIEM solution.

Supports Two Factor Authentication

Paired with Alliance Two Factor Authentication, organizations can reduce the security weakness of relying on passwords as their only authentication mechanism.  By requiring an additional piece of information delivered to authorized users via SMS text or voice message, organizations can improve security of their sensitive data.

Flexible Licensing Options

With flexible licensing options, including perpetual and subscription licensing, protecting sensitive data on the IBM i has never been easier or more affordable.

Translate »
Web Design MymensinghPremium WordPress ThemesWeb Development

New White Paper – Two Factor Authentication on the IBM i by Townsend Security

April 22, 2016April 22, 2016

Security Beyond Usernames and Passwords

Today's organizations must take a defensive strategy against the constant threat of network data breaches. Recent password leaks from high-profile sites (Anthem, Target, etc.) suggest that their sensitive data may not be as secure as once thought. Companies and web properties have to do a better job protecting security credentials.

Download this white paper to learn:

  • Why the IBM i may not be as secure as you think
  • The need for verification on the IBM i
  • How to meet compliance requirements (PCI DSS, FFIEC, etc.)

[Download Now]

For More Information:
Contact: Mr. Savio Sin (savio.sin@hkwiseco.com)
         Sales Manager - Wiseco Consultants Ltd. 

White paper – Simplifying Security for IBM i by Townsend Security

February 27, 2016February 27, 2016

Collecting real-time security events and actively monitoring system logs is one of the most effective security tools any organization can deploy. 

Request the Simplifying Security for IBM i and IBM Security QRadar white paper to find out more about: 

  • How IBM i customers can make integration with QRadar simple, fast, and inexpensive
  • How IBM Security QRadar users can rapidly experience success and better security
  • How continuous, active monitoring is a key security control
  • The security benefits of the combining IBM Security QRadar and Townsend Security's Alliance LogAgent for IBM QRadar

Now, the integration between Alliance LogAgent for IBM QRadar and IBM Security QRadar has dramatically reduced the effort and expense required to deploy an effective SIEM solution for the IBM i (AS/400, iSeries).

White paper – Top 10 Reasons to Choose PHP for IBM i Web Application Development by Townsend Security

February 13, 2016February 13, 2016

Learn why PHP is a great choice for IBM i web development and application modernization.

PHP ebook

When deciding on an IBM i web development strategy, it's important to choose technologies that are easy for RPG programmers to learn, attract new programmers and grow with technologies like mobile. PHP gives you all of this and more.

Download this free eBook to get a detailed look at the top 10 reasons why PHP is a great web development choice for IBM i shops, including:

  • Why PHP is easy for RPGers to learn
  • How you can leverage DB2 and RPG with PHP
  • The benefits of choosing an open-source language
  • Why PHP makes mobile applications easy to deploy

This eBook, which was co-sponsored by BCD and Zend, also features a foreword written by Alan Seiden.

Complete the form to the right to download it now!