for Use with z/OS
Advanced Capabilities for IBM Z Hardware and z/OS
While IBM Z may be the most secure platform available, data never rests or stays in once place. PK Protect’s persistent encryption keeps data safe from theft or misuse even when it leaves IBM Z.
Smaller File Size
From the inventors of the ZIP file format and enterprise-grade data compression, our industry-best technology compresses files, reducing them as much as 95 percent.
Processing can be offloaded to an IBM
Z Integrated Information Processor for fewer GP cycles.
Offload software data compression processing to the zEDC card to reduce demands on other system resources.
External HSM Integration
Synchronize symmetric and asymmetric keys with external HSM and ICSF over KMIP.
Application Layer Encryption
Protect information transmitted in a CICS environment using field level, format-preserving encryption.
Free up resources for other tasks. PK Protect keeps sensitive data secure while reducing demands on IBM Z resources and streamlining mainframe workflows. All in addition to reducing encryption overhead to 5 percent or less.
Smart and Easy
Quickly secure files and data without application changes, additional infrastructure, or professional services, and all without disrupting existing workflows. Sensitive data remains safe even when it’s sent outside of the mainframe environment.
Whether it is Big Data or Big Iron, PK Discover can scan and discover structured and unstructured data on z/OS, searching for sensitive information that may be out of compliance. Db2®, VSAM (ESDS, KSDS, RRDS, and LDS), PDS(/E), and SEQ targets are currently supported.