• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Linoma Bolsters Encryption Tool with New Data Masking Feature

    December 7, 2010 Alex Woodie

    Users who lack the proper authority to view sensitive IBM i data that’s been encrypted with the latest release of Linoma Software‘s Crypto Complete will instead be shown masked values when they try to access it. What’s more, this nifty security trick can be accomplished without fancy programming, in part because it’s based on the new DB2 Field Procedures functionality that IBM introduced with IBM i 7.1.

    When IBM announced IBM i 7.1 earlier this year, Linoma was one of only two vendors that supported the new Field Procedures functionality, which was developed to eliminate the need to modify application source code to enable encryption features in DB2/400 (officially DB2 for IBM i). With the new Field Proc exit point, encryption and decryption routines can be called whenever data is read from, inserted into, or updated in DB2/400.

    Linoma was ready for the Field Proc in April, when IBM i 7.1 shipped. With yesterday’s announcement of Crypto Complete 2.50, the Nebraska software vendor has refined its Field Proc repertoire to include the automated masking of field values.

    The capability to automatically mask the value of a database field for users who aren’t authorized to view unmasked and unencrypted values should be well-received by Crypto Complete customers who are struggling to adhere to stringent new regulations on data governance. And because the new feature can be implemented by having an administrator work within Crypto Complete’s field encryption registry, it should save customers a lot of time and hassle.

    Another enhancement included in Crypto Complete version 2.50 is the faster execution of encryption routines against IFS backups. Linoma says the performance is “significantly faster” when a large number of IFS files and directories are included with backup encryption routines. The decryption and restore commands are also executed faster.

    Version 2.50 also provides additional authentication checks for users with all object (*ALLOBJ) authority. Instead of giving *ALLOBJ users carte blanche authority to view encrypted fields, administrators can override IBM i authority levels within Crypto Complete’s field-level authorization lists for individuals and groups. This release also gives administrators more fine-grained control over program-adopted authority.

    This release also allows administrators to specify what values should be returned to users who lack authority to view unencrypted or unmasked data. It also includes better support for double byte character sets (DBCS) that are critical for supporting Asian languages, Linoma reports.

    Crypto Complete provides encryption, data masking, and tokenization capabilities for data residing on IBM i, Windows, Linux, and other computer systems. Encryption capabilities include support for AES256, AES192, AES128 or TDES algorithms, and an integrated key management utility that complies with provisions of PCI DSS. The software, which runs on OS/400 V5R2 and higher, provides native IBM i and SQL interfaces for integrating encryption routines directly into applications, and collects a full audit trail for compliance purposes.

    Crypto Complete version 2.50 is available now. Pricing is tier-based and begins at around $4,000. For more information see www.linoma.com.

    RELATED STORIES

    Linoma is Ready for New Automated Encryption Feature in i/OS 7.1

    IBM Officially Announces i/OS 7.1

    Linoma Adds Tokenization to i/OS Encryption Tool

    Linoma Adds Features to i OS Encryption Utility

    Free Tool from Linoma Detects Credit Card, Social Security Numbers

    CDW Taps Linoma for Database Encryption

    Crypto Tool from Linoma to be Offered by Bsafe

    Automating Database Encryption Expands Linoma’s Portfolio



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    Embrace VS Code for IBM i Development

    The IBM i development landscape is evolving with modern tools that enhance efficiency and collaboration. Ready to make the move to VS Code for IBM i?

    Join us for this webinar where we’ll showcase how VS Code can serve as a powerful editor for native IBM i code and explore the essential extensions that make it possible.

    In this session, you’ll discover:

    • How ARCAD’s integration with VS Code provides deep metadata insights, allowing developers to assess the impact of their changes upfront.
    • The role of Git in enabling seamless collaboration between developers using tools like SEU, RDi, and VS Code.
    • Powerful extensions for code quality, security, impact analysis, smart build, and automated RPG conversion to Free Form.
    • How non-IBM i developers can now contribute to IBM i projects without prior knowledge of its specifics, while ensuring full control over their changes.

    The future of IBM i development is here. Let ARCAD be your guide!

    Watch Now

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    VAULT400:  Which is right for you? Online back-up, DR, HA Webinar. Dec. 16, Jan. 20
    LANSA:  FREE Webinar. "Think Beyond Modernization." Dec 16
    PowerTech:  FREE Webinar! Configuring Real-Time Security Event Notification. Dec. 8

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    Time Out: Watch These Videos The Top 10 IBM i Security Exposures, Part 2

    Leave a Reply Cancel reply

Volume 10, Number 43 -- December 7, 2010
THIS ISSUE SPONSORED BY:

Databorough
PowerTech
RevSoft
Linoma Software
Twin Data Corporation

Table of Contents

  • Web 2.0 Development Such a ‘Drag’ in RBD 8
  • Aldon Gets Agile, In More Ways Than One
  • Linoma Bolsters Encryption Tool with New Data Masking Feature
  • Virtualization is Hurting DR Preparedness, Vision Says
  • RJS Streamlines the Application of Digital Signatures
  • Attachmate Updates MFT Tool
  • Infor Expands Tools Partnership with Utilities 400
  • Micro Focus Adds C# Support to Modernization Workbench
  • Tupperware Heats Up for Holidays with New Power Servers
  • UNIT 4 Opens Hybrid Cloud Division, Buys Polish ERP Developer

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25
  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle