PGP Encryption Platform extends support to IBM i for Power Systems

PGP Corporation released PGP Command Line for IBM Power Systems in conjunction with its presence this week at Infosecurity Europe 2009 in London. PGP is continuing to extend its support for a broad range of operating systems including midrange and mainframe environments, Windows, Unix, Linux and now IBM i; making it even easier for enterprises to integrate and automate business information security with end-to-end encryption.

IBM i (formerly known as i5/OS) supports virtualized, large transaction processing and line-of-business (LOB) applications typically deployed in vertical industries such as financial services, retail, insurance, manufacturing and distribution.

To ensure the confidentiality and privacy of customer and partner information, whether the data is in use, at rest, or in transit, it must be protected and encrypted at all times in the case of interception, loss or theft. Even more importantly, data must be protected to meet stringent compliance and regulatory mandates, in addition to corporate security policies and practices.

PGP Command Line for IBM Power Systems enables administrators to add encryption to existing business processes including batch processing, data transfer and backup. By automating the encrypted transfer and back-up of large volumes of business data, IBM Power Systems customers using PGP Command Line can ensure compliance with corporate mandates and information security regulations. With PGP Command Line, IBM Power Systems administrators can easily integrate information security and data protection into existing automation scripts and back-up processes – data moving across networks and stored on servers is encrypted and protected at the source. With PGP technology, the integrity of the data is supported throughout its lifecycle with end-to-end encryption, no matter where the data resides.

Examples of how PGP Command Line secures data on IBM Power Systems include:

  • Moving data to and from remote corporate offices, partner, or customer sites over internal networks or the public internet
  • Data residing on servers accessible by local system administrators or exposed to other unauthorised personnel by gaps in the local security infrastructure
  • Data transferred for offsite storage and in danger of being lost, misplaced, or stolen.



Share this