Volume 19, Number 9 -- March 1, 2010

System Automation, VTL, and Security Linked in Help/Systems, Crossroads Deal

Published: March 1, 2010

by Dan Burger

Help/Systems, one of the dominant providers of system administration and security tools for the IBM i platform, has expanded its technological reach by forming a partnership with Crossroads Systems, a company known for its data security products. Specifically, this means the Help/Systems automated operations software--primarily Robot/SAVE, but also Robot/SCHEDULE and Robot/REPORTS--will be will be matched with Crossroads' SPHiNX virtual tape appliance.

The integration of these products offers an increase in automated and secure media management including object inventory of systems, audit trails, encryption, and optional use of tape.

Sales and marketing will be handled by Help/Systems and will be targeted at a combined customer base of more than 21,000 organizations.

As a disaster recovery option, the combination of Robot/SAVE and SPHiNX is expected to improve recovery time and increases storage capacity, while leveraging existing investments in disk and tape backup infrastructure.

The Robot/SAVE backup and recovery software provides the tape management functions for a single system (Power Systems running IBM i and its predecessors) or a data center made up of these systems. It also supports a centralized scratch pool. It supports VTL as if it is another tape drive. For companies dealing with regulatory compliance issues such as the Sarbanes-Oxley Act, HIPAA, and PCI requirements, the management capabilities of the Robot/SAVE-SPHiNX combo simplify many of the otherwise labor-intensive tasks.

The SPHiNX virtual tape library eliminates several cost factors and workflow bottlenecks that include tape mounts (it's disk-to-disk), third-party tape storage facilities, and in most cases will either eliminate or reduce the number of tapes required. It also allows the conversion of old tapes to modern formats. However, don't get the wrong idea. The SPHiNX VTL supports tape drives, bringing users the speed of writing to the VTL during backups, while later writing to tape for off-site storage. This saves cycles on the Power System server(s) that would have been used for writing to tape.

In addition, users have a choice of encryption methods: software data encryption using Robot/SAVE or hardware encryption using SPHiNX.

Crossroads introduced SPHiNX for Power Systems in September 2009. Prior to that, the technology had been used in the Hewlett-Packard NonStop (formerly Tandem) server market in an HP OEM-branded version for more than six years.

Tom Huntington, vice president of technical services at Help/Systems, describes the technological marriage as a solution that "helps eliminate several backup and recovery headaches that many data center managers struggle with daily. Issues with tape mounts, replication, off-site storage, encryption, tape costs, and security are just a few of the items we can resolve with this solution set."

Huntington is joining Glenn Haley, a senior product manager with Crossroads, in presenting an online Webinar that highlights the capabilities of this new approach to disaster recovery. That presentation is scheduled for Thursday, March 18, at noon CST. Registration is available here.


Help/Systems Extends i OS Job Scheduler to Linux and Unix

Crossroads Pushing VTL Solution to System i Customers

Help/Systems Supports Windows with i OS-Based Job Scheduler

Help/Systems Supports HP-UX with i OS Job Scheduler

                     Post this story to
               Post this story to Digg
    Post this story to Slashdot

Sponsored By

Crypto Complete will secure your data at rest

Guard sensitive data fields automatically with Crypto Complete. With strong AES encryption and integrated key management, Crypto Complete helps System i shops quickly comply with regulations and PCI requirements. No source code changes are required for encryption. Crypto Complete provides an intuitive user interface and comprehensive audit trails.

Tokenization is now available with the new release of Crypto Complete 2.20, which should be considered when sensitive data is stored on multiple systems. Tokenization is the process of replacing sensitive data with unique identification numbers (e.g. tokens) and storing the original data on a central server in encrypted form. By centralizing sensitive data, tokenization helps to thwart hackers and minimize the scope of compliance audits such as PCI.

Tokenization can be used to protect any sensitive data elements including credit card numbers (PAN), bank account numbers, Social Security numbers and other personal identity information.

Crypto Complete offers several advantages when tokenization is required:

· Centralizes key management and policies on a single server

· Supports tokenization of data from diverse systems including System i, Windows, Linux, AIX, etc.

· Provides remote connections to token functions through secure HTTPS protocol

· Auto-assigns token identifiers from the central token server

· Encrypts and stores tokenized data into scalable DB2 physical files

· Allows securing data elements by User Id, User Group and/or Authorization Lists

· Provides centralized audit logs and message alerts

Get Compliant with PCI, HIPAA and State Privacy Laws!

To learn how to protect your data
and download a free Crypto Complete trial, visit

Editor: Timothy Prickett Morgan
Contributing Editors: Dan Burger, Joe Hertvik, Brian Kelly, Shannon O'Donnell,
Mary Lou Roberts, Victor Rozek, Kevin Vandever, Hesh Wiener, Alex Woodie
Publisher and Advertising Director: Jenny Thomas
Advertising Sales Representative: Kim Reed
Contact the Editors: To contact anyone on the IT Jungle Team
Go to our contacts page and send us a message.

Sponsored Links

Northeast User Groups Conference:  20th Annual Conference, April 12 - 14, Framingham, MA
DRV Technologies:  SpoolFlex automatically converts reports to user friendly PC formats - FREE trial!
COMMON:  Join us at the annual 2010 conference, May 3 - 6, in Orlando, Florida



IT Jungle Store Top Book Picks

Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
The iSeries Express Web Implementer's Guide: List Price, $49.95
The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
The System i Pocket RPG & RPG IV Guide: List Price, $69.95
The iSeries Pocket Database Guide: List Price, $59.00
The iSeries Pocket SQL Guide: List Price, $59.00
The iSeries Pocket Query Guide: List Price, $49.00
The iSeries Pocket WebFacing Primer: List Price, $39.00
Migrating to WebSphere Express for iSeries: List Price, $49.00
Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
Getting Started with WebSphere Express for iSeries: List Price, $49.00
Can the AS/400 Survive IBM?: List Price, $49.00
Chip Wars: List Price, $29.95

Four Hundred Stuff
Visual LANSA Gets Expanded Interoperability, Developer Convenience

Linoma Bolsters Surveyor/400 with Excel Capabilities, SSL

Lawson Updates M3 Suite of ERP Apps for i/OS

Customers Begin Using ilook to Web-Enable i/OS System Screens

Shield Adds IFS Replication to HA Offering

Four Hundred Guru
Naming Idiosyncrasies with the DB2 Storage Engine for MySQL

How To Use the Inhibit Write Keyword?

Hunting Down Storage Hogs

Four Hundred Monitor
Four Hundred Monitor's
Full iSeries Events Calendar

System i PTF Guide
February 20, 2010: Volume 12, Number 08

February 13, 2010: Volume 12, Number 07

February 6, 2010: Volume 12, Number 06

January 30, 2010: Volume 12, Number 05

January 23, 2010: Volume 12, Number 04

January 16, 2010: Volume 12, Number 03

TPM at The Register
Marathon reels in another $6.5m

Windows server revenue outpaced Linux in Q4

Novell: Linux finally breaks even

EMC shuffles Ionix to VMware

Novell flirts with Citrix

HyTrust nets $10.5m in funding

Cray inks $45m super pact with DoD

Gartner report card gives high marks to x64, blades

Netezza to bake analytics into appliances

IBM services help complicate cloud's horizon

Intel and friends in $3.5bn tech stimulation

Server makers end 2009 on a high normal


Linoma Software
WorksRight Software

Printer Friendly Version

X64 and Blade Servers Lead the Server Recovery

Custom Baby Data Centers Coming from Big Blue

System Automation, VTL, and Security Linked in Help/Systems, Crossroads Deal

Mad Dog 21/21: It's i or Die for Power in the Midrange

Hackers Escalate Web Site Attacks, Despite Decline in Security Vulnerabilities

But Wait, There's More:

IBM Cuts Power 595 CPU Prices, Offers Remote Server Migration . . . No Power 750, 770, and 780 Prices for i Configs? What Gives? . . . MKS Recovering Nicely From the Economic Storm . . . IBM Assigns Per-Core Pricing Metrics to Power7 Chips . . . Intelliden Snapped Up by IBM for Network Management . . .

The Four Hundred


Subscription Information:
You can unsubscribe, change your email address, or sign up for any of IT Jungle's free e-newsletters through our Web site at

Copyright © 1996-2010 Guild Companies, Inc. All Rights Reserved.
Guild Companies, Inc., 50 Park Terrace East, Suite 8F, New York, NY 10034

Privacy Statement