Overview
What is PK Encryption?
A tool to convert usable data into an unreadable format and provide decryption only to those with proper access. PK Encryption supports enterprise data protection strategies with complete administrative control for finding and protecting sensitive data wherever it is stored.
Recent Reviews
Leaving a review helps other professionals like you evaluate Endpoint Encryption Software
Be the first one in your network to review PK Encryption, and make your voice heard!
Get StartedPricing
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
Alternatives Pricing
Product Details
- About
- Competitors
- Tech Details
What is PK Encryption?
A tool to convert usable data into an unreadable format and provide decryption only to those with proper access. PK Encryption supports enterprise data protection strategies with complete administrative control for finding and protecting sensitive data wherever it is stored.
The solution offers
The solution offers
- Multiple Forms of Encryption - How and when data is protected can be chosen, no matter where it is stored, shared, or copied with persistent, format-preserving, and transparent encryption.
- IBM Z and IBM I Leveraged Crypto Hardware - Extends IBM Pervasive Encryption® with IBM CPACF, zIIP, and zEDC for IBM Z, along with FIPS-140 compliant PCIe3 Crypto Coprocessor for IBM I.
- Endpoint, Cloud, and On-Premises - Encrypts data at endpoints such as laptops and mobile devices, as well as in large-scale cloud storage, databases, and file servers.
- Maintain Current Workflows - Secures files and data without application changes, additional infrastructure, or professional services.
- Element and Column-Level Encryption - Protects sensitive elements in unstructured files and cloud storage objects, and sensitive columns in databases and structured files.
- Safeguard Email Exchanges - Can securely send end-to-end encrypted emails internally and externally while preserving user workflows.
PK Encryption Competitors
PK Encryption Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |