• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Linoma Adds Tokenization to i/OS Encryption Tool

    March 9, 2010 Alex Woodie

    Linoma Software last week announced Crypto Complete version 2.2, a new release of its i/OS encryption utility that now features cross-platform tokenization capabilities. With the new offering, customers can centralize the storage of sensitive data, such as credit card and Social Security numbers, on a secure System i server, while enabling applications running on other i/OS, Windows, Linux, or Unix servers to access that data using tokens and HTTPS.

    Linoma unveiled Crypto Complete in 2007 to provide i/OS shops with an easier route to encryption and decryption that bypassed working with IBM APIs, which can be difficult to learn and use. The configuration-based approach offered by Crypto Complete reduces the amount of manual work required to set up encryption in DB2/400 databases, the IFS, and tape backups, and to keep the encryption routines up-to-date, even as the data changes. The utility, which supports AES and 3DES encryption algorithms, also offers encryption key management, logging, and alerting features.

    Now, the addition of tokenization capabilities makes Crypto Complete an even more well-rounded utility for encryption, particularly for mid-size to large organizations struggling to comply with the Payment Cardholder Industry (PCI) industry mandate.

    To enable tokenization, Linoma built an i/OS-based token server that communicates with applications running on Windows, Linux, Unix, and other i/OS servers. Instead of storing sensitive data locally, these applications request a token (a gibberish string of numbers or letters) from the token server.

    That token takes the place of the sensitive data, which has been encrypted and stored on the i/OS server, thereby minimizing the risk of losing the data. To retrieve the data, the application submits its token and accompanying authentication information, and the sensitive data is then unencrypted and sent, via HTTPS, to the requesting application.

    Used in this manner, tokenization can minimize the scope of PCI audits, according to Bob Luebbe, chief architect for Linoma Software. “If you have a PCI auditor come in and say, ‘We’re going to look at all the systems that store credit card data,’ you can say, ‘Oh, it’s just this one system that stores credit card numbers. All our other systems are clean,'” Luebbe says. “So the auditor will only look at that system, and it can save a lot of money by not having them digging around on all those other systems that used to store credit card data.”

    Linoma incorporated a new HTTPS transport mechanism to support the new tokenization capabilities (alternatively, customers can transmit tokens via SQL and ODBC or JDBC). Using HTTPS is the easiest and safest way to exchange data in a tokenization environment, Luebbe says. “You just tell it your token server’s IP address, what user name and password to use, and we do all the underlying communication protocol work,” he says. ‘You don’t have to know how to do HTTPS or the intricacies of it. Our APIs do all that work for you.”

    Linoma decided to build tokenization into Crypto Complete, instead of building a brand new tokenization tool (as some of its competitors have done), for a couple of reasons. First, the two security disciplines are very closely related. “We were able to use a lot of the existing framework,” Luebbe says. “We didn’t have to change our key management at all to support this. You can use the same keys to encrypt tokenized data as you can to encrypt local data. We were also able to keep auditing the same.”

    Another factor for piggy-backing tokenization onto the encryption tool was the relatively small pool of potential customers for tokenization. Luebbe estimates about 10 percent of prospective customers for Crypto Complete have shown an interest in tokenization.

    “They’re mainly hearing it from industry articles or their PCI auditors,” he says. “They’re just trying to figure out how to make life simpler ultimately, and tokenization has the promise of making it simpler.”

    Customers’ desire for simplicity also meshes with the fact that Linoma’s token server runs exclusively on i/OS and leverages the legendary security and reliability of the System i server. Luebbe foresees offering a tokenization appliance, with Crypto Complete packaged onto System i servers.

    “The iSeries is just such a naturally secure machine in the first place,” Luebbe says. “That’s something we’re aiming for, to come into a non-iSeries shop and actually sell them Crypto Complete as kind of an appliance, packaged right onto an iSeries system. I think that would be really cool.”

    There are some caveats to tokenization. For starters, application response times will be slightly slower when data isn’t stored locally. Linoma found tokenization added 5 milliseconds to application response times when running Crypto Complete on a System i Model 520. There’s also the matter of access to data. While the System i server is one of the most reliable servers in the world, an organization that has moved all its sensitive data in production to a System i server would probably want to protect that data with a high availability solution, Luebbe says.

    Despite the new tokenization features, Linoma has not raised the price of Crypto Complete. Licenses are tier-based and start at around $4,000. For more information, visit www.linomasoftware.com.

    RELATED STORIES

    nuBridges Calls for Tokenization Standards

    Linoma Adds Features to i OS Encryption Utility

    Free Tool from Linoma Detects Credit Card, Social Security Numbers

    CDW Taps Linoma for Database Encryption

    Crypto Tool from Linoma to be Offered by Bsafe

    Automating Database Encryption Expands Linoma’s Portfolio



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Midrange Dynamics North America

    Git up to speed with MDChange!

    Git can be lightning-fast when dealing with just a few hundred items in a repository. But when dealing with tens of thousands of items, transaction wait times can take minutes.

    MDChange offers an elegant solution that enables you to work efficiently any size Git repository while making your Git experience seamless and highly responsive.

    Learn more.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    RevSoft:  Enterprise solutions for data transfers, messaging and scheduling
    Linoma Software:  IBM i Encryption and Tokenization with Crypto Complete 2.20
    COMMON:  Join us at the annual 2010 conference, May 3 - 6, in Orlando, Florida

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    Arrow ECS Adds Professional Services A Case for CASE

    Leave a Reply Cancel reply

Volume 10, Number 10 -- March 9, 2010
THIS ISSUE SPONSORED BY:

Help/Systems
Bytware StandGuard Security
MaxAva
DRV Technologies
COMMON

Table of Contents

  • Genesta Offers Quick and Inexpensive Voice Enablement for i/OS Apps
  • Infor to Target BPCS Shops with ‘Flex’ Upgrade Program
  • Linoma Adds Tokenization to i/OS Encryption Tool
  • Vision Debuts PowerPack for POWER7 Migration
  • Quadrant Simplifies Workflows with IntelliChief 2.6.1
  • Fiserv Benchmarks i/OS Financial App at Rochester Lab
  • ICS Delivers More Output Options with FormSprint Update
  • Symtrax BI Tool Now Works with Open Source Spreadsheet
  • Genuitec Readies New Release of MyEclipse IDE
  • ABI Says RFID Spending

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle