• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Innovatum Adds Biometric Authentication to Improve Compliance ‘Auditability’

    March 4, 2008 Dan Burger

    Regulations that affect the collection, storage, and retrieval of electronic data records have hit IT departments like a snow storm in Miami Beach. IT managers have been shivering ever since mandates such as Sarbanes Oxley, Gramm-Leach-Bliley, HIPAA, and the FDA’s 21 CFR part 11, plus a blizzard of other industry-specific compliance rules have entered their domain. Early efforts to make the grade were manual labor intensive. To get out from under that heavy load, organizations looked to technology for automated solutions. Innovatum, with its data monitoring software, has been in the thick of it.

    Coupled with the cold blast of government and industry regulations has been the transition from traditional paper-based to electronic-based data management. This transition has not been entirely smooth, as your particular experience may painfully demonstrate. Costs–yes, it’s true–have been known to exceed expectations.

    Just as there are costs associated with a surge in manual labor, there will be costs involved with implementing technology. The point is acknowledged in Innovatum’s white paper on electronic records management strategy. Compared to the costs associated with noncompliance, inaccurate data, inefficiencies, and slow response to informational requirements, the technology is less expensive, according to the Innovatum report.

    Collecting information from a variety of source systems and loading it into a system for storage and quick retrieval is part of the electronic records management equation. But with regulatory compliance comes the huge responsibility of implementing security measures and auditability features.

    Each government and industry mandate demands a unique but persistent monitoring of database activity. The monitoring must adhere to both internal and external audit demands. So far, so good, right? Maybe. The difficult part comes with identifying beyond the last change and identifying that change by user and date field. You likely have this record, but it gets overlaid each time the record is updated.

    That brings us to Innovatum’s latest enhancement to its DataThread software that monitors database access at the record and field level. It has accomplished this by incorporating transaction-level user authentication into all System i applications.

    Innovatum turned to Valid Technologies for this expanded capability. Valid Secure System Authentication (VSSA) replaces passwords with fingerprint biometric authentication. It makes use of centralized authentication processes and journals that track each transaction.

    VSSA runs natively on i5/OS and in conjunction with standard USB-based fingerprint scanners from APC. It interacts with applications through calls to source code embedded into the RPG, COBOL, Java, C++, or Visual Basic.

    “The integration of VSSA and DataThread will enable a 360-degree view of System i activity and real-time authentication at the most granular level, on the data, where you need it,” says Valid Technologies’ CTO Tom Secreto, who also promises this user authentication “adds significantly to security, accountability, and productivity.”

    Innovatum will sell and support DataThread with or without the VSSA option. VSSA is marketed through OEMs and IBM business partners on a one-time license basis, and is priced based on the number of active enrolled VSSA users.

    The announcement by Innovatum signals more traction for biometric authentication in the System i market. One month ago, Patrick Townsend & Associates, a software company that provides data encryption, key management, and security logging solutions to enterprise-level companies, announced it has integrated VSSA with its i5/OS encryption offerings.

    RELATED STORIES

    Pat Townsend to Resell Valid’s i5/OS Biometric Authentication

    Valid Tech Assimilates Biometric Authentication Into the Enterprise

    Valid Tech Delivers Biometric Authentication Solution for OS/400



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    Raz-Lee Security is the leader in security and compliance solutions that guard business-critical information on IBM i servers. We are committed to providing the best and most comprehensive solutions for compliance, auditing, and protection from threats and ransomware. We have developed cutting-edge solutions that have revolutionized analysis and fortification of IBM i servers.

    Raz-Lee’s flagship iSecurity suite of products is comprised of solutions that help your company safeguard and monitor valuable information assets against intrusions. Our state-of-the-art products protect your files and databases from both theft and extortion attacks. Our technology provides visibility into how users access data and applications, and uses sophisticated user tracking and classification to detect and block cyberattacks, unauthorized users and malicious insiders.

    With over 35 years of exclusive IBM i security focus, Raz-Lee has achieved outstanding development capabilities and expertise. We work hard to help your company achieve the highest security and regulatory compliance.

    Key Products:

    • AUDIT
    • FIREWALL
    • ANTIVIRUS
    • ANTI-RANSOMWARE
    • MULTI-FACTOR AUTHENTICATION
    • AP-JOURNAL
    • DB-GATE
    • FILESCOPE
    • COMPLIANCE MANAGER
    • FIELD ENCRYPTION

    Learn about iSecurity Products at https://www.razlee.com/isecurity-products/

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    COMMON:  Join us at the annual 2008 conference, March 30 - April 3, in Nashville, Tennessee
    ARCAD Software:  Dynamic, world-class ALM on and around the System i
    New Generation Software:  Look at NGS-IQ before replacing Query/400

    IT Jungle Store Top Book Picks

    Getting Started with PHP for i5/OS: List Price, $59.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket Developers' Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    iSeries Express Web Implementer's Guide: List Price, $59.00
    Getting Started with WebSphere Development Studio for iSeries: List Price, $79.95
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    WebFacing Application Design and Development Guide: List Price, $55.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    The All-Everything Machine: List Price, $29.95
    Chip Wars: List Price, $29.95

    IBM Ponies Up Another $15 Billion for Share Buybacks Performance Advice from a Mysterious Friend

    Leave a Reply Cancel reply

Volume 8, Number 9 -- March 4, 2008
THIS ISSUE SPONSORED BY:

Aldon
PowerTech
Profound Logic Software
Linoma Software
Guild Companies

Table of Contents

  • Centerfield Adds More Smarts to Database Performance Suite
  • Aura Equipments Pushes i5/OS-Excel Integration
  • Innovatum Adds Biometric Authentication to Improve Compliance ‘Auditability’
  • Surf’s Up for Web-Based Organized Crime, IBM X-Force Says
  • WorksRight Gains USPS Certification, Launches New Product
  • looksoftware Gives Adidas Korea’s Green-Screen ERP an Office Interface
  • Lawson to Acquire Developer of HR Software
  • Atempo Cuts Setup Time with Time Navigator 4.2
  • Solimar Updates Output Management Software, Receives Xerox Award
  • Cleo Updates B2B Communications Software

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • The IBM i Power10 Upgrade Cycle Forecast Looks Favorable
  • White Hats Completely Dismantle Menu-Based Security
  • Cloud Software To Drive Enterprise Application Growth
  • How Do You Stay In Touch With The IBM i Community?
  • IBM i PTF Guide, Volume 25, Number 6
  • Security Still Top Concern, IBM i Marketplace Study Says
  • Bob Langieri Shares IBM i Career Trends Outlook for 2023
  • Kisco Brings Native SMS Messaging to IBM i
  • Four Hundred Monitor, February 1
  • 2023 IBM i Predictions, Part 4

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.