for Use with z/OS
Advanced Capabilities for IBM Z Hardware and z/OS
While IBM Z may be the most secure platform available, data never rests or stays in once place. PK Protect’s persistent encryption keeps data safe from theft or misuse even when it leaves IBM Z.
Smaller File Size
From the inventors of the ZIP file format and enterprise-grade data compression, our industry-best technology compresses files, reducing them as much as 95 percent.
Processing can be offloaded to an IBM
Z Integrated Information Processor for fewer GP cycles.
Offload software data compression processing to the zEDC to reduce demands on other system resources.
Synchronize symmetric and asymmetric keys with internal and external HSMs.
Application Layer Encryption
Programmatically apply Field Level Encryption within application buffers with the PKZAPIO.
Free up resources for other tasks. PK Protect keeps sensitive data secure while reducing demands on IBM Z resources and streamlining mainframe workflows. All in addition to reducing encryption overhead to 5 percent or less.
Smart and Easy
Quickly secure files and data without application changes, additional infrastructure, or professional services, and all without disrupting existing workflows. Sensitive data remains safe even when it’s sent outside of the mainframe environment.
Whether it is Big Data or Big Iron, PK Discover can scan and discover structured and unstructured data on z/OS, searching for sensitive information that may be out of compliance. Db2®, Informix®, Neteeza®, VSAM (ESDS, KSDS, RRDS, and LDS), PDS(/E), and sequential targets are supported.