• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Linoma Adds Features to i OS Encryption Utility

    August 4, 2009 Alex Woodie

    System i professionals will have an easier time implementing field-level data encryption using the latest release of Linoma Software‘s Crypto Complete. Unveiled July 15, version 2.0 adds several time-saving features, including more flexibility when encrypting alphanumeric fields, more fine-toothed security access control, and pre-formatted audit reports. All told, the enhancements combine to make field-level encryption on the System i less painful.

    Linoma unveiled Crypto Complete nearly two years ago as companies began implementing field-level encryption, the strongest level of encryption recommended by the Payment Cardholder Industry (PCI) group. The software uses encryption algorithms that are included in i OS, but which can be difficult to use. According to Linoma, whereas IBM’s APIs require working with 30 or so parameters, Crypto Complete only asks the programmer or administrator to worry about a handful of them–maybe five or six parameters.

    With Crypto Complete version 2.0, Linoma has worked to streamline certain elements of the System i encryption equation. For example, this release brings the capability to encrypt alphanumeric fields of any length, without having to change field definitions or store the encrypted values externally.

    Previously, the software could only do in-field encryption of alphanumeric data if the size of the field was divisible by 16 or 24. Otherwise, the field needed to be expanded, or the encrypted data needed to be stored in an external file (created and managed by the software). Version 2.0 lifts that restriction, making it easier to automatically encrypt alphanumeric data. However, encryption of numeric data fields still requires the external-file approach.

    The new version also provides more nuanced access control for decryption routines. With this release, administrators can grant users the right to view decrypted data at the field level based on the role assigned to them under the i OS authorization list. Alternatively, the administrator can allow the users to only see masked values.

    One of the best parts of Crypto Complete–its capability to automatically encrypt fields as they are modified over time–has also been improved with version 2. This automation is a product of Crypto Complete’s “field encryption registry,” which the customers use at the outset to indicate which files should be encrypted (performed in one giant batch encryption), and which also keeps all changes and additions to a file encrypted over time.

    Linoma offers two methods for detecting when files have been changed and need to be encrypted: use of native API calls or SQL triggers. In version 2, the SQL trigger method has been improved with new SQL functions and stored procedures to support embedded SQL and remote database connections via JDBC and ODBC.

    This release adds support for automated encryption of fields contained in multi-member files. Administrators also can choose to use Crypto Complete’s field-level encryption only with certain user-selectable records. Customers also get support for encrypting and decrypting multiple files on the IFS using wildcard names, according to Linoma.

    Another handy addition to Crypto Complete are customizable security alerts. With version 2, administrators can be notified of unauthorized attempts to use the software, or of any security-related changes to a customer’s implementation. The feature works with i OS system messages and e-mail.

    Getting instant notification of suspicious activity is helpful if the administrator is in a position to take immediate steps to stop the breach. But the more likely scenario involves discovering abnormalities after the fact, via the audit trail. Crypto Complete keeps an audit log of all activity for after-the-fact reporting and regulatory compliance purposes. And with version 2, the reporting capability has been improved with more powerful filters that allow demonstrators to sort by user profile, data and time ranges, and audit types.

    Version 2 also includes a copy of the free Find Database Fields (FNDDBFLD) tool that Linoma introduced earlier this month. FNDDBFLD tells users if their databases contain sensitive data, such as credit card numbers or Social Security numbers, which can be a huge liability if left unprotected. Linoma is allowing anybody to download the free tool, which makes good business sense, as it may lead to more Crypto Complete sales, but including the tool in the Crypto Complete package only seemed fair.

    The new release of Crypto Complete is easier to use, according to Bob Luebbe, chief architect at Linoma Software, which is based near Omaha, Nebraska. “We wanted to make it simple for customers to encrypt sensitive data and achieve compliance with PCI and privacy laws,” he says in a press release. “I believe this new 2.0 release of Crypto Complete achieves that goal, while providing a strong integrated key management system and detailed audit trails.”

    Crypto Complete version 2 is available now. Pricing, which is tier-based, has not changed, and ranges from about $4,000 to about $14,000. For more information, visit the company’s Web site at www.linomasoftware.com.

    RELATED STORIES

    Free Tool from Linoma Detects Credit Card, Social Security Numbers

    CDW Taps Linoma for Database Encryption

    Crypto Tool from Linoma to be Offered by Bsafe

    Automating Database Encryption Expands Linoma’s Portfolio



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    Raz-Lee Security is the leader in security and compliance solutions that guard business-critical information on IBM i servers. We are committed to providing the best and most comprehensive solutions for compliance, auditing, and protection from threats and ransomware. We have developed cutting-edge solutions that have revolutionized analysis and fortification of IBM i servers.

    Raz-Lee’s flagship iSecurity suite of products is comprised of solutions that help your company safeguard and monitor valuable information assets against intrusions. Our state-of-the-art products protect your files and databases from both theft and extortion attacks. Our technology provides visibility into how users access data and applications, and uses sophisticated user tracking and classification to detect and block cyberattacks, unauthorized users and malicious insiders.

    With over 35 years of exclusive IBM i security focus, Raz-Lee has achieved outstanding development capabilities and expertise. We work hard to help your company achieve the highest security and regulatory compliance.

    Key Products:

    • AUDIT
    • FIREWALL
    • ANTIVIRUS
    • ANTI-RANSOMWARE
    • MULTI-FACTOR AUTHENTICATION
    • AP-JOURNAL
    • DB-GATE
    • FILESCOPE
    • COMPLIANCE MANAGER
    • FIELD ENCRYPTION

    Learn about iSecurity Products at https://www.razlee.com/isecurity-products/

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    looksoftware:  In tough economic times, modernize and REUSE! View the On-Demand Webinar
    ProData Computer Services:  Simplify your iT with DBU, DBU RDB, and RDB Connect
    COMMON:  Celebrate our 50th anniversary at annual conference, May 2 - 6, 2010, in Orlando

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    Gartner: Fifth Consecutive Year of Double Digit CRM Growth Designing DB2 for i Stored Procedures for Simulated Array Handling

    Leave a Reply Cancel reply

Volume 9, Number 29 -- August 4, 2009
THIS ISSUE SPONSORED BY:

Infor
Bytware
East Coast Computer
Computer Keyes
VAULT400

Table of Contents

  • Infor Launches New CRM App for System i
  • ERP Application Functionality Prompts Migration to IBM System i
  • Linoma Adds Features to i OS Encryption Utility
  • SEA Brings i OS Performance Tool to North America
  • IBM to Buy SPSS for $1.2 Billion
  • Trend Micro Offers Anti Virus for Domino on i5/OS
  • MochaSoft Delivers 5250 Emulator for BlackBerry
  • Quadrant Gives FastFax More Control Over E-Mails, PDFs
  • Surround Tech Reminds Visual LANSA Users of Add-On Tools’ Value
  • RPG & DB2 Summit Set for October in Minneapolis

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Fresche Nabs Silveredge for Application Services
  • Longtime Product Guy Sarrasin Switches to Services
  • The IBM i Power10 Upgrade Cycle Forecast Looks Favorable
  • White Hats Completely Dismantle Menu-Based Security
  • Cloud Software To Drive Enterprise Application Growth
  • How Do You Stay In Touch With The IBM i Community?
  • IBM i PTF Guide, Volume 25, Number 6
  • Security Still Top Concern, IBM i Marketplace Study Says
  • Bob Langieri Shares IBM i Career Trends Outlook for 2023
  • Kisco Brings Native SMS Messaging to IBM i

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.