Organizations of all sizes are deploying encryption to meet data security compliance requirements, protect intellectual property, and secure their customer’s personally identifiable information (PII).
This eBook explores the architecture, implementation, critical features and limitations of Field Procedures (FieldProc) on the IBM i and points to some solutions to the primary challenges. Learn how the FieldProc exit point in the IBM i OS enables encrypting data at rest without application changes. Review the importance of encryption key management, performance factors, and additional security controls that can enhance your encryption practices. Syncsort security solutions that meet these challenges are also introduced.