• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • i OS Security Vendors Tap nuBridges for Encryption and Tokenization

    July 21, 2009 Alex Woodie

    nuBridges has recently entered into partnerships with two i OS security vendors, Raz-Lee Security and Safestone Technologies, to provide those vendors’ i OS customers with encryption and tokenization solutions that, among other things, will help to satisfy PCI DSS requirements.

    The deals with Safestone and Raz-Lee involve nuBridges Protect, a Java-based encryption tool that works with System i and other server platforms. Much of the excitement appears to be over the Token Manager module that nuBridges launched in April at an initial cost of $50,000 per server.

    Tokenization is viewed as the next big thing in encryption. Instead of storing encrypted data locally, organizations can centralize their encrypted data stores, and use tokens to handle application requests for sensitive data like credit card numbers. This not only minimizes the risks inherent in handling encrypted data, it also reduces data storage costs.

    Raz-Lee, which is based New York and maintains R&D in Israel, plans to sell the solution to its iSecurity customers in Israel. “With nuBridges Protect, our customers will enjoy the benefits of an all-inclusive PCI-DSS compliance solution, complete with encryption and tokenization,” Raz-Lee CEO Shmuel Zailer says in a press release.

    Also reselling nuBridges Protect and the Token Manager module is Safestone Technologies, the i OS security tool vendor based in the U.K.

    The partnership with nuBridges allows Safestone to provide “the best” encryption solutions to its DetectIT customers, according to Safestone chief operating officer Terry Heath. “With nuBridges Protect, we can now provide our customers with a comprehensive way to encrypt data as it moves across networks and also address a specific PCI DSS requirement,” he says in a press release.

    RELATED STORIES

    AIG-Israel Taps Raz-Lee for i OS Security Tool

    nuBridges Pushes ‘Tokenization’ with New Encryption Tool

    Safestone Cracks Down on Excessive Authority with PUP



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Maxava

    Migrate IBM i with Confidence

    Tired of costly and risky migrations? Maxava Migrate Live minimizes disruption with seamless transitions. Upgrading to Power10 or cloud hosted system, Maxava has you covered!

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Profound Logic Software:  Tune in to Profound Logic TV for FREE educational videos and tips
    Maximum Availability:  *noMAX - Subscription edition now available (US & UK)
    COMMON:  Celebrate our 50th anniversary at annual conference, May 2 - 6, 2010, in Orlando

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    Pat Townsend Secure with New President Circumventing Two Limitations of CPYTOIMPF

    Leave a Reply Cancel reply

Volume 9, Number 28 -- July 21, 2009
THIS ISSUE SPONSORED BY:

looksoftware
Help/Systems
Maximum Availability
Linoma Software
Tri-Delta Resources

Table of Contents

  • IBM Kills Secure Perspectives Tool
  • Bicycle Seller Rolls with Electronic Vaulting Backup and DR from UCG
  • JDA Shares Plans for E3 Fulfillment Products
  • Quadrant Adds a Slew of Updates to Forms Software
  • Kisco Gives i OS Auditing Tool a Web Makeover
  • CCSS Adds Syslog Support to QMessage Monitor
  • i OS Security Vendors Tap nuBridges for Encryption and Tokenization
  • Rimini Street Gets Equity Investment from Adams Street
  • Zobrist Offers Search-Friendly URLs for WebSphere Commerce
  • AIG-Israel Taps Raz-Lee for i OS Security Tool

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle