• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Linoma Adds Tokenization to i/OS Encryption Tool

    March 9, 2010 Alex Woodie

    Linoma Software last week announced Crypto Complete version 2.2, a new release of its i/OS encryption utility that now features cross-platform tokenization capabilities. With the new offering, customers can centralize the storage of sensitive data, such as credit card and Social Security numbers, on a secure System i server, while enabling applications running on other i/OS, Windows, Linux, or Unix servers to access that data using tokens and HTTPS.

    Linoma unveiled Crypto Complete in 2007 to provide i/OS shops with an easier route to encryption and decryption that bypassed working with IBM APIs, which can be difficult to learn and use. The configuration-based approach offered by Crypto Complete reduces the amount of manual work required to set up encryption in DB2/400 databases, the IFS, and tape backups, and to keep the encryption routines up-to-date, even as the data changes. The utility, which supports AES and 3DES encryption algorithms, also offers encryption key management, logging, and alerting features.

    Now, the addition of tokenization capabilities makes Crypto Complete an even more well-rounded utility for encryption, particularly for mid-size to large organizations struggling to comply with the Payment Cardholder Industry (PCI) industry mandate.

    To enable tokenization, Linoma built an i/OS-based token server that communicates with applications running on Windows, Linux, Unix, and other i/OS servers. Instead of storing sensitive data locally, these applications request a token (a gibberish string of numbers or letters) from the token server.

    That token takes the place of the sensitive data, which has been encrypted and stored on the i/OS server, thereby minimizing the risk of losing the data. To retrieve the data, the application submits its token and accompanying authentication information, and the sensitive data is then unencrypted and sent, via HTTPS, to the requesting application.

    Used in this manner, tokenization can minimize the scope of PCI audits, according to Bob Luebbe, chief architect for Linoma Software. “If you have a PCI auditor come in and say, ‘We’re going to look at all the systems that store credit card data,’ you can say, ‘Oh, it’s just this one system that stores credit card numbers. All our other systems are clean,'” Luebbe says. “So the auditor will only look at that system, and it can save a lot of money by not having them digging around on all those other systems that used to store credit card data.”

    Linoma incorporated a new HTTPS transport mechanism to support the new tokenization capabilities (alternatively, customers can transmit tokens via SQL and ODBC or JDBC). Using HTTPS is the easiest and safest way to exchange data in a tokenization environment, Luebbe says. “You just tell it your token server’s IP address, what user name and password to use, and we do all the underlying communication protocol work,” he says. ‘You don’t have to know how to do HTTPS or the intricacies of it. Our APIs do all that work for you.”

    Linoma decided to build tokenization into Crypto Complete, instead of building a brand new tokenization tool (as some of its competitors have done), for a couple of reasons. First, the two security disciplines are very closely related. “We were able to use a lot of the existing framework,” Luebbe says. “We didn’t have to change our key management at all to support this. You can use the same keys to encrypt tokenized data as you can to encrypt local data. We were also able to keep auditing the same.”

    Another factor for piggy-backing tokenization onto the encryption tool was the relatively small pool of potential customers for tokenization. Luebbe estimates about 10 percent of prospective customers for Crypto Complete have shown an interest in tokenization.

    “They’re mainly hearing it from industry articles or their PCI auditors,” he says. “They’re just trying to figure out how to make life simpler ultimately, and tokenization has the promise of making it simpler.”

    Customers’ desire for simplicity also meshes with the fact that Linoma’s token server runs exclusively on i/OS and leverages the legendary security and reliability of the System i server. Luebbe foresees offering a tokenization appliance, with Crypto Complete packaged onto System i servers.

    “The iSeries is just such a naturally secure machine in the first place,” Luebbe says. “That’s something we’re aiming for, to come into a non-iSeries shop and actually sell them Crypto Complete as kind of an appliance, packaged right onto an iSeries system. I think that would be really cool.”

    There are some caveats to tokenization. For starters, application response times will be slightly slower when data isn’t stored locally. Linoma found tokenization added 5 milliseconds to application response times when running Crypto Complete on a System i Model 520. There’s also the matter of access to data. While the System i server is one of the most reliable servers in the world, an organization that has moved all its sensitive data in production to a System i server would probably want to protect that data with a high availability solution, Luebbe says.

    Despite the new tokenization features, Linoma has not raised the price of Crypto Complete. Licenses are tier-based and start at around $4,000. For more information, visit www.linomasoftware.com.

    RELATED STORIES

    nuBridges Calls for Tokenization Standards

    Linoma Adds Features to i OS Encryption Utility

    Free Tool from Linoma Detects Credit Card, Social Security Numbers

    CDW Taps Linoma for Database Encryption

    Crypto Tool from Linoma to be Offered by Bsafe

    Automating Database Encryption Expands Linoma’s Portfolio



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Maxava

    Migrate IBM i with Confidence

    Tired of costly and risky migrations? Maxava Migrate Live minimizes disruption with seamless transitions.

    Upgrading to Power10, Power11, or cloud hosted system, Maxava has you covered!

    Book A Consultation Today

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    RevSoft:  Enterprise solutions for data transfers, messaging and scheduling
    Linoma Software:  IBM i Encryption and Tokenization with Crypto Complete 2.20
    COMMON:  Join us at the annual 2010 conference, May 3 - 6, in Orlando, Florida

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    Arrow ECS Adds Professional Services A Case for CASE

    Leave a Reply Cancel reply

Volume 10, Number 10 -- March 9, 2010
THIS ISSUE SPONSORED BY:

Help/Systems
Bytware StandGuard Security
MaxAva
DRV Technologies
COMMON

Table of Contents

  • Genesta Offers Quick and Inexpensive Voice Enablement for i/OS Apps
  • Infor to Target BPCS Shops with ‘Flex’ Upgrade Program
  • Linoma Adds Tokenization to i/OS Encryption Tool
  • Vision Debuts PowerPack for POWER7 Migration
  • Quadrant Simplifies Workflows with IntelliChief 2.6.1
  • Fiserv Benchmarks i/OS Financial App at Rochester Lab
  • ICS Delivers More Output Options with FormSprint Update
  • Symtrax BI Tool Now Works with Open Source Spreadsheet
  • Genuitec Readies New Release of MyEclipse IDE
  • ABI Says RFID Spending

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • With Power11, Power Systems “Go To Eleven”
  • With Subscription Price, IBM i P20 And P30 Tiers Get Bigger Bundles
  • Izzi Buys CNX, Eyes Valence Port To System Z
  • IBM i Shops “Attacking” Security Concerns, Study Shows
  • IBM i PTF Guide, Volume 27, Number 26
  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle