• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • GDPR Data Discovery On Tap from Raz-Lee

    April 18, 2018 Alex Woodie

    With less than six weeks to go before the General Data Protection Regulation (GDPR) goes into effect, it’s crunch time for remediation. For IBM i shops that aren’t sure where sensitive data resides in their databases, a power tool from Raz-Lee Security can provide some automated relief.

    The GDPR represents a dramatic overhaul of the privacy laws governing what companies can do with data about European citizens. Backed by the central European Union government, the GDPR provides sweeping new rules that require any organization storing data about EU citizens to obtain consent for that data, to ensure that it’s protected, and to delete the data upon citizen requests (i.e. “the right to be forgotten”) among other things.

    While the law nominally impacts only those dealing with EU citizens, the fact that EU citizens represent more than 10 percent of the Earth’s population means that the GDPR is the first global law providing guidance on storing data used for general purposes (as opposed to healthcare data, which is governed by HIPAA and credit card data, which is covered by PCI DSS). Nearly every big American company will be impacted by GDPR, and a large number of smaller firms across various industries will also have European clients and, thus, need to comply with the GDPR or risk fines of up to 4 percent of annual sales per incident.

    In the IBM i space, organizations are now under the gun to explore some far-flung reaches of their database to ensure there’s no GDPR-governed data in it – or if there is, make sure that it’s properly protected (through encryption) and that the European citizens whom it belongs to has provided the proper consent. If you haven’t started on your GDPR remediation program, chances are slim that you’ll finish in time, but starting now would show the beginnings of a good faith effort to comply.

    IBM i security software provider Raz-Lee Security this week rolled out a product called Data Discovery for GDPR & PCI that can help with GDPR remediation. The Windows-based product is designed to simplify and accelerate just one aspect of GDPR and PCI compliance: identifying the culprit data.

    Finding the data isn’t easy because many IBM i shops have been collecting data for years, says Raz-Lee Security Marketing Manager Anjel Sadiky. “This can be a real challenge because database environments can be very dynamic and organizations lack the capability to see if they have sensitive data,” she says.

    It may be relatively easy to find names, birthdates, phone numbers, and email addresses, but article 4 of the GDPR states that any data that identifies a European citizen – including descriptors of physical, genomic, mental, cultural, or social indicators – falls under the scope of GDPR.

    “Each business is unique in terms of what kind of information they have,” Sadiky tells IT Jungle. “I think a lot of businesses up until now didn’t have to take full responsibility for what kind of information they gathered. The more the better. And now, they actually need to start taking account for what kind of information they have, what they need to protect, because for each business, their method of dealing with it will be a little different.”

    Raz-Lee’s new Data Discovery tool provides an automated way to find Db2 for i files that fall under the jurisdiction of GDPR.

    In addition to potentially storing rare or unusual types of data, IBM i shops may be challenged by the location where they store data. Ideally, the Db2 for i schema is well documented, or at least the administrator in charge has a firm grasp of the data his company is collecting. Of course, reality has a bad habit of throwing curveballs at the most well-prepared, and bits of data can show up in the darndest places.

    “Maybe you don’t have people’s birthdates, or you don’t think you do,” Sadiky says. “Maybe at some point you did and it’s in a different library or it’s stored in some place that hasn’t been used for years, so you don’t know about it. You need to be able to locate all that information in order to make the proper decision and become compliant properly.”

    The new Data Discovery tool helps with GDPR remediation by scouring the Db2 for i database for particular types of data. The user tells Data Discovery what kinds of values to look for in database fields, and the tool goes off and finds all instances where the fields match the value.

    The Windows-based product works in a wizard-like fashion, and returns results in a table format. In addition to telling the user where particular pieces of data is located, it tells them whether the data is encrypted or not. (GDPR does not require sensitive data to be encrypted, but it does require data to be protected, and encryption is viewed as good method of protection.)

    Data Discovery is part of a new suite of products under the Raz-Lee iSecurity brand that will soon be announced. Dubbed Security Investigator Suite, the suite will include two additional products, Authority Inspector and Assessment, besides Data Discovery. The Authority Inspector product will provide insight on excessive user authority, while Assessment identifies the security risks to IBM i systems. “Together,” Raz-Lee says, “they deliver a comprehensive view of the vulnerabilities within an organization.”

    RELATED STORIES

    Does IBM i Need Independent Security Vendors?

    Raz-Lee Tackles Excessive Authorities with Free Software

    Raz-Lee Touts DB-Gate User Stories

    Raz-Lee Claims Technological Edge with IBM i Encryption

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: GDPR, General Data Protection Regulation, IBM i

    Sponsored by
    VISUAL LANSA 16 WEBINAR

    Trying to balance stability and agility in your IBM i environment?

    Join this webinar and explore Visual LANSA 16 – our enhanced professional low-code platform designed to help organizations running on IBM i evolve seamlessly for what’s next.

    🎙️VISUAL LANSA 16 WEBINAR

    Break Monolithic IBM i Applications and Unlock New Value

    Explore modernization without rewriting. Decouple monolithic applications and extend their value through integration with modern services, web frameworks, and cloud technologies.

    🗓️ July 10, 2025

    ⏰ 9 AM – 10 AM CDT (4 PM to 5 PM CEST)

    See the webinar schedule in your time zone

    Register to join the webinar now

    What to Expect

    • Get to know Visual LANSA 16, its core features, latest enhancements, and use cases
    • Understand how you can transition to a MACH-aligned architecture to enable faster innovation
    • Discover native REST APIs, WebView2 support, cloud-ready Azure licensing, and more to help transform and scale your IBM i applications

    Read more about V16 here.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    ‘Air Gap’ Your Data with Tape, LTO Group Says IBM Kills iAccess for Windows, Older RDi Versions

    Leave a Reply Cancel reply

TFH Volume: 28 Issue: 30

This Issue Sponsored By

  • UCG TECHNOLOGIES
  • New Generation Software
  • ProData Computer Services
  • COMMON
  • T.L. Ashford

Table of Contents

  • IBM Kills iAccess for Windows, Older RDi Versions
  • GDPR Data Discovery On Tap from Raz-Lee
  • ‘Air Gap’ Your Data with Tape, LTO Group Says
  • Four Hundred Monitor, April 18
  • IBM i PTF Guide, Volume 20, Number 15

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25
  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle