• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Trinity Guard Unveils New Tools for Linux, Db2 for i

    November 18, 2020 Alex Woodie

    Trinity Guard is on the move. The Houston, Texas, based security software company, which is the spiritual successor to the PentaSafe products, is rolling out a full auditing solution for Linux. It’s also developing a Linux version of its security management tool, TGCentral, with an AIX version up next. Plus it’s months away from releasing an encryption solution for Db2 for i.

    2020 has not been easy for anyone, but it’s not stopping the folks at Trinity Guard from moving forward on its roadmap items. Near the top of that list is increased support for running on Linux, which has become the dominant operating system for business servers around the world.

    The new TGAudit for Linux solution provides a full-fledged auditing solution for a variety of Linux environments, including Linux running on Power, X86, and ARM servers. The offering will interrogate a customer’s Linux environment and return a report that shows exactly how its security settings are configured, says Randy Bowie, the vice president of engineering at Trinity Guard.

    “[It includes] pretty much everything you need to cover industry standard practices, things like Center for Internet Security type benchmarks and NIST standards, which are mapped into regulations like PCI, HIPAA, and SOX,” Bowie says.

    The software is built around OS Query, an open source query tool that is built on the SQL Lite database. TGAudit maps all of the security settings for a given Linux server into the database, and the query tool powers a set of best-practice reports included with the software.

    “There are 220 reports to start with. It’s easy for us or customers to extend that and add their own reporting for different things they want to provide evidence for,” Bowie says. “We also have things like Delta Reports, so we can share with you, for that particular subsystem, what’s changed since the last time you checked it.”

    TGAudit monitors every security configuration for the Linux kernel, as well as subsystems and services that may be running against it. Like on IBM i, there can be too much data at times, so customers sometimes find they need to whittle the monitoring down to a more manageable level.

    TGAudit will support Trinity Guard’s Delta Reports feature, which compares two reports to quickly see before and after values.

    “We have access to pretty much every subsystem,” Bowie says. “With Linux you’ve got everything but the kitchen sink sometimes and you really want to limit that down to the things that you need to monitor, the [critical] modules and things like file systems that that have vulnerabilities.”

    The software will also integrate with popular SIEMS, such as Graylog, Elastic, and Splunk, just like Trinity Guard’s IBM i products do. In a subsequent release of the product, TGAudit for Linux will provide more security event management capabilities of its own.

    Trinity Guard’s roadmap calls for developing other security tools for Linux, once the auditing tool is in place. Just as it offers network security product (TGSecure) and event monitoring and alerting (TGDetect), it also has plans to offer those types of capabilities for Linux as well.

    “Like with iSeries, we are just coming with the audit stuff first, then we’ll come with Detect and Security layers,” says Tony Perera, president and co-founder of Trinity Guard.

    Following Linux, the plan calls for developing auditing and security software for AIX. There are a number of IBM i shops that are moving to AIX, based in part on the cost of their ERP software, Perera says.

    Trinity Guard is also supporting the TGCentral server running on Linux. TGCentral provides a common point for managing multiple Trinity Guard products, including TGAudit, TGSecure, and TGDetect. It powers a Web browser that surfaces insights from all of those products, and provides pre-defined reports that map to major regulations, like HIPAA and SOX.

    Customers will soon be able to access Trinity Guard’s centralized security management console, TGCentral, running from a Windows or a Linux server.

    While the TGCentral dashboard could be accessed from a Web browser running on any client device, the server component of TGCentral only installed on Windows before. Now it’s running on Linux too, to go along with TGAudit for Linux and the forthcoming development of other security tools for Linux and AIX.

    Finally, Trinity Guard is delivering a field-level encryption solution for Db2 for i, called TGEncrypt. The software will leverage the industry-standard AES-256 encryption algorithm, as well as IBM’s field procedure, which reduces the amount of work required to adapt an existing IBM i application to use database encryption.

    In addition to encrypting, the software will mask or scramble data. It will encrypt or otherwise protect data based on the role of the user trying to access it, or according to the IP address of the computer they’re using to access the Db2 for i database. TGEncrypt will keep an audit trail of all activity, and send alerts to TGCentral or to a SIEM.

    Users can use a third-party key management system to manage encryption keys for TGEnrypt, or they can use an internal key management functionality. The internal key management works but is not too elaborate. “We tried to keep it simple for a small customer to use encryption,” Perera says.

    TGEncrypt is expected to ship in January. For more information, see the company’s website at www.trinityguard.com.

    RELATED STORIES

    Trinity Guard Launches Third IBM i Product

    Trinity Guard Gives Audit Tool A Friendly GUI

    Trinity Guard Fills Gap In IBM i Network Security

    Trinity Guard Gives PentaSafe Customers a Lifeline

     

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: AIX, DB2 for i, Enterprise Content Management, ERP, HIPAA, IBM i, Linux, NIST, PCI, Power Systems, SOX, Trinity Guard, X86

    Sponsored by
    ARCAD Software

    Embrace VS Code for IBM i Development

    The IBM i development landscape is evolving with modern tools that enhance efficiency and collaboration. Ready to make the move to VS Code for IBM i?

    Watch this webinar where we showcase how VS Code can serve as a powerful editor for native IBM i code and explore the essential extensions that make it possible.

    In this session, you’ll discover:

    • How ARCAD’s integration with VS Code provides deep metadata insights, allowing developers to assess the impact of their changes upfront.
    • The role of Git in enabling seamless collaboration between developers using tools like SEU, RDi, and VS Code.
    • Powerful extensions for code quality, security, impact analysis, smart build, and automated RPG conversion to Free Form.
    • How non-IBM i developers can now contribute to IBM i projects without prior knowledge of its specifics, while ensuring full control over their changes.

    The future of IBM i development is here. Let ARCAD be your guide!

    Watch the replay now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Christmas for Ransomware: How COVID-19 Is Fueling Cybercrime IBM i PTF Guide, Volume 22, Number 47

    Leave a Reply Cancel reply

TFH Volume: 30 Issue: 74

This Issue Sponsored By

  • Maxava
  • Datanational Corporation
  • Blair Technology Solutions
  • UCG Technologies
  • Raz-Lee Security

Table of Contents

  • Trinity Guard Unveils New Tools for Linux, Db2 for i
  • Christmas for Ransomware: How COVID-19 Is Fueling Cybercrime
  • Don’t Count Tape Out Just Yet, ESG Report Says
  • Four Hundred Monitor, November 18
  • IBM i PTF Guide, Volume 22, Number 46

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19
  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle