Automate Encryption and Decryption on the IBM i with New Release of Alliance AES/400

Share Article

Townsend Security’s AES/400 version 6.0 for the IBM i enables customers to automatically encrypt or decrypt database fields and easily implement external key management for regulatory compliance.

“Your encryption project just got easier! Our new automated encryption capability is an absolute game changer. It is simply the easiest, fastest and most secure way to encrypt data on the IBM i” said John Earl, Townsend CEO. “Administrators can encrypt

Townsend Security, the leading provider of data encryption solutions on the IBM i, announces its updated N.I.S.T. validated Alliance AES/400 encryption solution enables automatic encryption and decryption at a database field level and enables organizations to securely manage their encryption keys on a FIPS certified appliance. The new release simplifies processes for securing and controlling access to encrypted and decrypted data. It is revolutionary for customers who are considering encryption for IBM i based applications.

This latest release of AES/400 enables companies to externally manage encryption keys and meet PCI and HIPAA/HITECH compliance requirements using Townsend’s FIPS 140-2 certified key manager. Administrators can enforce separation of duties and maintain dual control over encryption keys and the encrypted data. Automate all encryption key management processes including key rotation, retrieval and change to save time and money.

AES/400 v6 encrypts IBM i databases quickly too. With unrivaled speed, AES/400 can implement encryptions at the database level and leave your development team to focus on other important projects. AES/400 v6 enables administrators to encrypt fields that store data such as credit card numbers, social security numbers, birth dates, account numbers and other personally identifiable information (PII) without impacting applications. The same AES/400 APIs that encrypt 10 million records in a CPU second are used in version 6.0.

“Your encryption project just got easier! Our new automated encryption capability is an absolute game changer. It is simply the easiest, fastest and most secure way to encrypt data on the IBM i,” said John Earl, Townsend CEO. “Administrators can encrypt database fields with just the push of a button. More importantly, by just entering a few names in our control tables, you get rigid control over who can decrypt the data.”

Automatic encryption and decryption on the IBM i works for all users and applications, so controlling access to the decryption process is essential for maintaining data privacy. Administrators cannot rely on native IBM i object, or user authorities to control access to encrypted data. AES/400 v6 equips administrators with the ability to secure access to the protected data, it helps enforce user access control with a built in data masking capability. Security administrators can easily define the users who should have access to all of the data, and then define a default policy that masks critical data for other users.

Alliance AES/400 v6 is the only N.I.S.T. validated AES database encryption solution for IBM i V7R1 (and all other supported IBM i releases) and Townsend Security guarantees its encryption software will always meet or exceed the encryption requirements of compliance regulations such as HIPAA/HITECH, PCI, and State Privacy laws.

The product is available for evaluation and upgrade copies are available for customers who are current on their maintenance contracts for the product. Learn more at A recorded webinar of automatic encryption on V7R1 is available for download here.

About Townsend Security
Known as The Encryption Company, Townsend Security was founded in 1985 and is headquartered in Olympia, WA. Townsend Security is a leading provider of N.I.S.T. certified software and appliance data privacy solutions.

About the Technology
Townsend Security guarantees its certified solutions will always meet or exceed the encryption and key management standards in PCI, HIPAA/HITECH and state privacy laws. Built for compliance - strong encryption and key management secures data at the source, secure file transfers ensure data moves securely outside the organization and real-time system logging provides essential security event reporting.

# # #

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Christina Sylvester
Townsend Security Inc.
(360) 359-4409
Email >
Visit website