• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Linoma Adds Features to i OS Encryption Utility

    August 4, 2009 Alex Woodie

    System i professionals will have an easier time implementing field-level data encryption using the latest release of Linoma Software‘s Crypto Complete. Unveiled July 15, version 2.0 adds several time-saving features, including more flexibility when encrypting alphanumeric fields, more fine-toothed security access control, and pre-formatted audit reports. All told, the enhancements combine to make field-level encryption on the System i less painful.

    Linoma unveiled Crypto Complete nearly two years ago as companies began implementing field-level encryption, the strongest level of encryption recommended by the Payment Cardholder Industry (PCI) group. The software uses encryption algorithms that are included in i OS, but which can be difficult to use. According to Linoma, whereas IBM’s APIs require working with 30 or so parameters, Crypto Complete only asks the programmer or administrator to worry about a handful of them–maybe five or six parameters.

    With Crypto Complete version 2.0, Linoma has worked to streamline certain elements of the System i encryption equation. For example, this release brings the capability to encrypt alphanumeric fields of any length, without having to change field definitions or store the encrypted values externally.

    Previously, the software could only do in-field encryption of alphanumeric data if the size of the field was divisible by 16 or 24. Otherwise, the field needed to be expanded, or the encrypted data needed to be stored in an external file (created and managed by the software). Version 2.0 lifts that restriction, making it easier to automatically encrypt alphanumeric data. However, encryption of numeric data fields still requires the external-file approach.

    The new version also provides more nuanced access control for decryption routines. With this release, administrators can grant users the right to view decrypted data at the field level based on the role assigned to them under the i OS authorization list. Alternatively, the administrator can allow the users to only see masked values.

    One of the best parts of Crypto Complete–its capability to automatically encrypt fields as they are modified over time–has also been improved with version 2. This automation is a product of Crypto Complete’s “field encryption registry,” which the customers use at the outset to indicate which files should be encrypted (performed in one giant batch encryption), and which also keeps all changes and additions to a file encrypted over time.

    Linoma offers two methods for detecting when files have been changed and need to be encrypted: use of native API calls or SQL triggers. In version 2, the SQL trigger method has been improved with new SQL functions and stored procedures to support embedded SQL and remote database connections via JDBC and ODBC.

    This release adds support for automated encryption of fields contained in multi-member files. Administrators also can choose to use Crypto Complete’s field-level encryption only with certain user-selectable records. Customers also get support for encrypting and decrypting multiple files on the IFS using wildcard names, according to Linoma.

    Another handy addition to Crypto Complete are customizable security alerts. With version 2, administrators can be notified of unauthorized attempts to use the software, or of any security-related changes to a customer’s implementation. The feature works with i OS system messages and e-mail.

    Getting instant notification of suspicious activity is helpful if the administrator is in a position to take immediate steps to stop the breach. But the more likely scenario involves discovering abnormalities after the fact, via the audit trail. Crypto Complete keeps an audit log of all activity for after-the-fact reporting and regulatory compliance purposes. And with version 2, the reporting capability has been improved with more powerful filters that allow demonstrators to sort by user profile, data and time ranges, and audit types.

    Version 2 also includes a copy of the free Find Database Fields (FNDDBFLD) tool that Linoma introduced earlier this month. FNDDBFLD tells users if their databases contain sensitive data, such as credit card numbers or Social Security numbers, which can be a huge liability if left unprotected. Linoma is allowing anybody to download the free tool, which makes good business sense, as it may lead to more Crypto Complete sales, but including the tool in the Crypto Complete package only seemed fair.

    The new release of Crypto Complete is easier to use, according to Bob Luebbe, chief architect at Linoma Software, which is based near Omaha, Nebraska. “We wanted to make it simple for customers to encrypt sensitive data and achieve compliance with PCI and privacy laws,” he says in a press release. “I believe this new 2.0 release of Crypto Complete achieves that goal, while providing a strong integrated key management system and detailed audit trails.”

    Crypto Complete version 2 is available now. Pricing, which is tier-based, has not changed, and ranges from about $4,000 to about $14,000. For more information, visit the company’s Web site at www.linomasoftware.com.

    RELATED STORIES

    Free Tool from Linoma Detects Credit Card, Social Security Numbers

    CDW Taps Linoma for Database Encryption

    Crypto Tool from Linoma to be Offered by Bsafe

    Automating Database Encryption Expands Linoma’s Portfolio



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Rocket Software

    Software built on TRUST. Delivered with LOVE.

    For over 35 years, Rocket Software’s solutions have empowered businesses to modernize their infrastructure, unlock data value, and drive transformation – all while ensuring modernization without disruption.

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    looksoftware:  In tough economic times, modernize and REUSE! View the On-Demand Webinar
    ProData Computer Services:  Simplify your iT with DBU, DBU RDB, and RDB Connect
    COMMON:  Celebrate our 50th anniversary at annual conference, May 2 - 6, 2010, in Orlando

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    Gartner: Fifth Consecutive Year of Double Digit CRM Growth Designing DB2 for i Stored Procedures for Simulated Array Handling

    Leave a Reply Cancel reply

Volume 9, Number 29 -- August 4, 2009
THIS ISSUE SPONSORED BY:

Infor
Bytware
East Coast Computer
Computer Keyes
VAULT400

Table of Contents

  • Infor Launches New CRM App for System i
  • ERP Application Functionality Prompts Migration to IBM System i
  • Linoma Adds Features to i OS Encryption Utility
  • SEA Brings i OS Performance Tool to North America
  • IBM to Buy SPSS for $1.2 Billion
  • Trend Micro Offers Anti Virus for Domino on i5/OS
  • MochaSoft Delivers 5250 Emulator for BlackBerry
  • Quadrant Gives FastFax More Control Over E-Mails, PDFs
  • Surround Tech Reminds Visual LANSA Users of Add-On Tools’ Value
  • RPG & DB2 Summit Set for October in Minneapolis

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20
  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle