What is PK Encryption?
A tool to convert usable data into an unreadable format and provide decryption only to those with proper access. PK Encryption supports enterprise data protection strategies with complete administrative control for finding and protecting sensitive data wherever it is stored.
The solution offers
The solution offers
- Multiple Forms of Encryption - How and when data is protected can be chosen, no matter where it is stored, shared, or copied with persistent, format-preserving, and transparent encryption.
- IBM Z and IBM I Leveraged Crypto Hardware - Extends IBM Pervasive Encryption® with IBM CPACF, zIIP, and zEDC for IBM Z, along with FIPS-140 compliant PCIe3 Crypto Coprocessor for IBM I.
- Endpoint, Cloud, and On-Premises - Encrypts data at endpoints such as laptops and mobile devices, as well as in large-scale cloud storage, databases, and file servers.
- Maintain Current Workflows - Secures files and data without application changes, additional infrastructure, or professional services.
- Element and Column-Level Encryption - Protects sensitive elements in unstructured files and cloud storage objects, and sensitive columns in databases and structured files.
- Safeguard Email Exchanges - Can securely send end-to-end encrypted emails internally and externally while preserving user workflows.
Categories & Use Cases
Technical Details
| Mobile Application | No |
|---|
FAQs
What is PK Encryption?
A tool to convert usable data into an unreadable format and provide decryption only to those with proper access. PK Encryption supports enterprise data protection strategies with complete administrative control for finding and protecting sensitive data wherever it is stored.
What are PK Encryption's top competitors?
WinZip are common alternatives for PK Encryption.