fhs
Volume 10, Number 43 -- December 7, 2010

Linoma Bolsters Encryption Tool with New Data Masking Feature

Published: December 7, 2010

by Alex Woodie

Users who lack the proper authority to view sensitive IBM i data that's been encrypted with the latest release of Linoma Software's Crypto Complete will instead be shown masked values when they try to access it. What's more, this nifty security trick can be accomplished without fancy programming, in part because it's based on the new DB2 Field Procedures functionality that IBM introduced with IBM i 7.1.

When IBM announced IBM i 7.1 earlier this year, Linoma was one of only two vendors that supported the new Field Procedures functionality, which was developed to eliminate the need to modify application source code to enable encryption features in DB2/400 (officially DB2 for IBM i). With the new Field Proc exit point, encryption and decryption routines can be called whenever data is read from, inserted into, or updated in DB2/400.

Linoma was ready for the Field Proc in April, when IBM i 7.1 shipped. With yesterday's announcement of Crypto Complete 2.50, the Nebraska software vendor has refined its Field Proc repertoire to include the automated masking of field values.

The capability to automatically mask the value of a database field for users who aren't authorized to view unmasked and unencrypted values should be well-received by Crypto Complete customers who are struggling to adhere to stringent new regulations on data governance. And because the new feature can be implemented by having an administrator work within Crypto Complete's field encryption registry, it should save customers a lot of time and hassle.

Another enhancement included in Crypto Complete version 2.50 is the faster execution of encryption routines against IFS backups. Linoma says the performance is "significantly faster" when a large number of IFS files and directories are included with backup encryption routines. The decryption and restore commands are also executed faster.

Version 2.50 also provides additional authentication checks for users with all object (*ALLOBJ) authority. Instead of giving *ALLOBJ users carte blanche authority to view encrypted fields, administrators can override IBM i authority levels within Crypto Complete's field-level authorization lists for individuals and groups. This release also gives administrators more fine-grained control over program-adopted authority.

This release also allows administrators to specify what values should be returned to users who lack authority to view unencrypted or unmasked data. It also includes better support for double byte character sets (DBCS) that are critical for supporting Asian languages, Linoma reports.

Crypto Complete provides encryption, data masking, and tokenization capabilities for data residing on IBM i, Windows, Linux, and other computer systems. Encryption capabilities include support for AES256, AES192, AES128 or TDES algorithms, and an integrated key management utility that complies with provisions of PCI DSS. The software, which runs on OS/400 V5R2 and higher, provides native IBM i and SQL interfaces for integrating encryption routines directly into applications, and collects a full audit trail for compliance purposes.

Crypto Complete version 2.50 is available now. Pricing is tier-based and begins at around $4,000. For more information see www.linoma.com.


RELATED STORIES

Linoma is Ready for New Automated Encryption Feature in i/OS 7.1

IBM Officially Announces i/OS 7.1

Linoma Adds Tokenization to i/OS Encryption Tool

Linoma Adds Features to i OS Encryption Utility

Free Tool from Linoma Detects Credit Card, Social Security Numbers

CDW Taps Linoma for Database Encryption

Crypto Tool from Linoma to be Offered by Bsafe

Automating Database Encryption Expands Linoma's Portfolio



                     Post this story to del.icio.us
               Post this story to Digg
    Post this story to Slashdot


Sponsored By
REVSOFT

Enterprise Data Transfers, Messaging and Scheduling.

Native products on each platform fully networked for an Enterprise view.

Transferrable Licenses and No charges for additional LPAR's.

Send and Receive Data with encryption, compression and translation.

Reply to Inquiry messages over the phone.

Run Group Jobs across platforms.

Free trial or book a Web Ex at www.revsoft.com


Editor: Alex Woodie
Contributing Editors: Dan Burger, Joe Hertvik,
Shannon O'Donnell, Timothy Prickett Morgan
Publisher and Advertising Director: Jenny Thomas
Advertising Sales Representative: Kim Reed
Contact the Editors: To contact anyone on the IT Jungle Team
Go to our contacts page and send us a message.

Sponsored Links

VAULT400:  Which is right for you? Online back-up, DR, HA Webinar. Dec. 16, Jan. 20
LANSA:  FREE Webinar. "Think Beyond Modernization." Dec 16
PowerTech:  FREE Webinar! Configuring Real-Time Security Event Notification. Dec. 8


 

IT Jungle Store Top Book Picks

BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

The iSeries Express Web Implementer's Guide: List Price, $49.95
The iSeries Pocket Database Guide: List Price, $59
The iSeries Pocket SQL Guide: List Price, $59
The iSeries Pocket WebFacing Primer: List Price, $39
Migrating to WebSphere Express for iSeries: List Price, $49
Getting Started with WebSphere Express for iSeries: List Price, $49
The All-Everything Operating System: List Price, $35
The Best Joomla! Tutorial Ever!: List Price, $19.95


 
The Four Hundred
Candescent Buys Quadrant Software as IntelliChief Spins Out

Cloud Beats Most In-House Security, Says IBM CTO

Server Sales Chug Along in the Third Quarter

As I See It: Stressing Over Stress

Maxava Widens Vision Lawsuit, Sues Sirius

Four Hundred Guru
The Top 10 IBM i Security Exposures, Part 1

Case-Sensitive SQL Identifiers

Admin Alert: Prototype Instructions for Running TCP/IP in i5/OS Restricted State

Four Hundred Monitor
Four Hundred Monitor's
Full iSeries Events Calendar

System i PTF Guide
September 25, 2010: Volume 12, Number 39

September 18, 2010: Volume 12, Number 38

September 11, 2010: Volume 12, Number 37

September 4, 2010: Volume 12, Number 36

August 28, 2010: Volume 12, Number 35

August 21, 2010: Volume 12, Number 34

TPM at The Register
Ellison: Sparc T4 due next year

American IT hires (some) new workers in November

Novell muddles through fiscal Q4

Oracle stuffs Mongolian clusters with Sparc T3s

Fujitsu shoots low with BX400 baby blade box

Linux and Windows iron power Q3 server revenues

Microsoft pumps cash into IBM bete noire

IBM chips the laser light fantastic

Forget Xmas: Get set for the octocore v Bulldozer DEATHMATCH

HP ramps Superdome 2 shipments

Red Hat snaps up Makara

Big iron, x64 refresh goose server sales

THIS ISSUE SPONSORED BY:

Databorough
PowerTech
RevSoft
Linoma Software
Twin Data Corporation


Printer Friendly Version


TABLE OF CONTENTS
Web 2.0 Development Such a 'Drag' in RBD 8

Aldon Gets Agile, In More Ways Than One

Linoma Bolsters Encryption Tool with New Data Masking Feature

Virtualization is Hurting DR Preparedness, Vision Says

RJS Streamlines the Application of Digital Signatures

News Briefs and Product Shorts:

Attachmate Updates MFT Tool . . . Infor Expands Tools Partnership with Utilities 400 . . . Micro Focus Adds C# Support to Modernization Workbench . . . Tupperware Heats Up for Holidays with New Power Servers . . . UNIT 4 Opens Hybrid Cloud Division, Buys Polish ERP Developer . . .

Four Hundred Stuff

BACK ISSUES




 
Subscription Information:
You can unsubscribe, change your email address, or sign up for any of IT Jungle's free e-newsletters through our Web site at http://www.itjungle.com/sub/subscribe.html.

Copyright © 1996-2010 Guild Companies, Inc. All Rights Reserved.
Guild Companies, Inc., 50 Park Terrace East, Suite 8F, New York, NY 10034

Privacy Statement