• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Trinity Guard Unveils New Tools for Linux, Db2 for i

    November 18, 2020 Alex Woodie

    Trinity Guard is on the move. The Houston, Texas, based security software company, which is the spiritual successor to the PentaSafe products, is rolling out a full auditing solution for Linux. It’s also developing a Linux version of its security management tool, TGCentral, with an AIX version up next. Plus it’s months away from releasing an encryption solution for Db2 for i.

    2020 has not been easy for anyone, but it’s not stopping the folks at Trinity Guard from moving forward on its roadmap items. Near the top of that list is increased support for running on Linux, which has become the dominant operating system for business servers around the world.

    The new TGAudit for Linux solution provides a full-fledged auditing solution for a variety of Linux environments, including Linux running on Power, X86, and ARM servers. The offering will interrogate a customer’s Linux environment and return a report that shows exactly how its security settings are configured, says Randy Bowie, the vice president of engineering at Trinity Guard.

    “[It includes] pretty much everything you need to cover industry standard practices, things like Center for Internet Security type benchmarks and NIST standards, which are mapped into regulations like PCI, HIPAA, and SOX,” Bowie says.

    The software is built around OS Query, an open source query tool that is built on the SQL Lite database. TGAudit maps all of the security settings for a given Linux server into the database, and the query tool powers a set of best-practice reports included with the software.

    “There are 220 reports to start with. It’s easy for us or customers to extend that and add their own reporting for different things they want to provide evidence for,” Bowie says. “We also have things like Delta Reports, so we can share with you, for that particular subsystem, what’s changed since the last time you checked it.”

    TGAudit monitors every security configuration for the Linux kernel, as well as subsystems and services that may be running against it. Like on IBM i, there can be too much data at times, so customers sometimes find they need to whittle the monitoring down to a more manageable level.

    TGAudit will support Trinity Guard’s Delta Reports feature, which compares two reports to quickly see before and after values.

    “We have access to pretty much every subsystem,” Bowie says. “With Linux you’ve got everything but the kitchen sink sometimes and you really want to limit that down to the things that you need to monitor, the [critical] modules and things like file systems that that have vulnerabilities.”

    The software will also integrate with popular SIEMS, such as Graylog, Elastic, and Splunk, just like Trinity Guard’s IBM i products do. In a subsequent release of the product, TGAudit for Linux will provide more security event management capabilities of its own.

    Trinity Guard’s roadmap calls for developing other security tools for Linux, once the auditing tool is in place. Just as it offers network security product (TGSecure) and event monitoring and alerting (TGDetect), it also has plans to offer those types of capabilities for Linux as well.

    “Like with iSeries, we are just coming with the audit stuff first, then we’ll come with Detect and Security layers,” says Tony Perera, president and co-founder of Trinity Guard.

    Following Linux, the plan calls for developing auditing and security software for AIX. There are a number of IBM i shops that are moving to AIX, based in part on the cost of their ERP software, Perera says.

    Trinity Guard is also supporting the TGCentral server running on Linux. TGCentral provides a common point for managing multiple Trinity Guard products, including TGAudit, TGSecure, and TGDetect. It powers a Web browser that surfaces insights from all of those products, and provides pre-defined reports that map to major regulations, like HIPAA and SOX.

    Customers will soon be able to access Trinity Guard’s centralized security management console, TGCentral, running from a Windows or a Linux server.

    While the TGCentral dashboard could be accessed from a Web browser running on any client device, the server component of TGCentral only installed on Windows before. Now it’s running on Linux too, to go along with TGAudit for Linux and the forthcoming development of other security tools for Linux and AIX.

    Finally, Trinity Guard is delivering a field-level encryption solution for Db2 for i, called TGEncrypt. The software will leverage the industry-standard AES-256 encryption algorithm, as well as IBM’s field procedure, which reduces the amount of work required to adapt an existing IBM i application to use database encryption.

    In addition to encrypting, the software will mask or scramble data. It will encrypt or otherwise protect data based on the role of the user trying to access it, or according to the IP address of the computer they’re using to access the Db2 for i database. TGEncrypt will keep an audit trail of all activity, and send alerts to TGCentral or to a SIEM.

    Users can use a third-party key management system to manage encryption keys for TGEnrypt, or they can use an internal key management functionality. The internal key management works but is not too elaborate. “We tried to keep it simple for a small customer to use encryption,” Perera says.

    TGEncrypt is expected to ship in January. For more information, see the company’s website at www.trinityguard.com.

    RELATED STORIES

    Trinity Guard Launches Third IBM i Product

    Trinity Guard Gives Audit Tool A Friendly GUI

    Trinity Guard Fills Gap In IBM i Network Security

    Trinity Guard Gives PentaSafe Customers a Lifeline

     

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: AIX, DB2 for i, Enterprise Content Management, ERP, HIPAA, IBM i, Linux, NIST, PCI, Power Systems, SOX, Trinity Guard, X86

    Sponsored by
    ARCAD Software

    [Live Webinar] Rewrite your Synon in Java? It could be… a mistake!

    Converting from Synon CA 2E to a modern language? There are many good reasons to take this step. Beyond the critical shortage of Synon skills, applications developed in this 4GL environment can no longer take advantage of key technology advances in the IBM i operating system. And though a leader in its day, the Synon CASE tool is incompatible with modern DevOps practices and concurrent development.

    Do you think the best way to move away from Synon CA 2E is by rewriting everything in Java?

    Think again. A full rewrite is risky, expensive, and slow — often leading to years of redevelopment and countless functional regressions.

    Join Philippe Magne, CEO of ARCAD Software and Ray Bernardi, senior solution architect to learn why a conversion to Free Form RPG is a risk-free and high-performance option that leverages the architecture of the original Synon application – retaining all the reliability and security advantages of the host platform.

    In our Webinar, we will share a secure, automated migration path for business applications developed in Synon CA 2E:

    • 100% automated conversion to modern Free Form RPG and DDL (SQL)
    • Guaranteed conversion accuracy with test automation process
    • Possible modernization of the user interface during the project
    • Risk free, fixed price Modernization as a Service (MaaS)
    • Modern full DevOps framework for delivery

    Leverage the competitive advantage within your Synon application.

    Register Today!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Christmas for Ransomware: How COVID-19 Is Fueling Cybercrime IBM i PTF Guide, Volume 22, Number 47

    Leave a Reply Cancel reply

TFH Volume: 30 Issue: 74

This Issue Sponsored By

  • Maxava
  • Datanational Corporation
  • Blair Technology Solutions
  • UCG Technologies
  • Raz-Lee Security

Table of Contents

  • Trinity Guard Unveils New Tools for Linux, Db2 for i
  • Christmas for Ransomware: How COVID-19 Is Fueling Cybercrime
  • Don’t Count Tape Out Just Yet, ESG Report Says
  • Four Hundred Monitor, November 18
  • IBM i PTF Guide, Volume 22, Number 46

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Bang For The Buck On Entry Power10 And Power11 Machines
  • A Hardware Refresh Is The Perfect Time To Re-Evaluate Your HA/DR Strategy
  • Fresche Taps AI For New RPG-To-Java Conversion Tool
  • Gartner Raises 2025 IT Spending Forecast, Puts Out 2026 Prediction
  • IBM i PTF Guide, Volume 27, Number 45
  • EvolveWare Makes Progress With RPG Code Modernization Using AI
  • Why The IBM i Market Needed Another VTL Option
  • What Price Power?
  • Cloud Revenues Saved By The GenAI Boom
  • IBM i PTF Guide, Volume 27, Number 44

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle