• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Swiss Bank Adopts Linoma’s IBM i Encryption Tool

    August 9, 2011 Alex Woodie

    The Swiss banking system is renowned for the tight-lipped approach it takes to information security. This has led to a steady stream of business from wealthy individuals and organizations who want their affairs handled with the highest of confidence. So when IDB (Swiss) Bank sought an encryption solution for its IBM i environment, its worth noting that it selected a solution from Linoma Software.

    IDB (Swiss) Bank provides private banking and financial services to private and corporate clients around the world. The bank, which is headquartered in Geneva and has a branch in Zurich, is a subsidiary of Israel Discount Bank, which has more than 200 branches around the world.

    IDBS debated whether to adopt a hardware encryption solution or use a software solution to meet its encryption needs, according to a case study posted on Linoma’s website.

    Initially, it was in favor of a hardware encryption solution, because it appeared to be faster, more integrated, easier to implement. However, it ultimately chose to go with a software solution due to several factors. First, the software approach was less expensive.

    Compatibility was also a big factor. If IDBS chose the hardware approach, it would require the bank to outfit all of its subsidiaries and operations with the proper equipment to ensure that each of them could decrypt and restore the backups if needed. With a software approach, getting the proper encryption and decryption capability was simply a matter of installing the right software, and possibly buying another license.

    Future compatibility was also a factor. “Banks are required to save and restore data for 10 years, but it is common for hardware to be replaced every few years,” an unnamed bank official says in Linoma’s case study. “Choosing one particular hardware solution would lock us in with a proprietary device and therefore limit our upgrade options.”

    The bank demoed two IBM i encryption solutions, including Linoma’s Crypto Complete. The two offerings were comparable in functionality and had roughly the same price, which was much less than a hardware encryption solution.

    Three factors swung the pendulum in favor of Crypto Complete, according to the case study. First, the Linoma offering performed encryption routines 20 percent faster than the other offering. Secondly, the Linoma documentation was “more detailed” than the competition. Lastly, the fact that a local company, Linoma’s French business partner European Software Business Development, was available to provide assistance made IDBS feel better about the Linoma offering.

    RELATED STORIES

    Linoma Breaks Crypto Tool into Two

    Linoma Bolsters Encryption Tool with New Data Masking Feature

    Linoma is Ready for New Automated Encryption Feature in i/OS 7.1

    IBM Officially Announces i/OS 7.1

    Linoma Adds Tokenization to i/OS Encryption Tool

    Linoma Adds Features to i OS Encryption Utility

    Free Tool from Linoma Detects Credit Card, Social Security Numbers

    CDW Taps Linoma for Database Encryption

    Crypto Tool from Linoma to be Offered by Bsafe

    Automating Database Encryption Expands Linoma’s Portfolio



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    DevSecOps & Peer Review – The Power of Automation

    In today’s fast-paced development environments, security can no longer be an afterthought. This session will explore how DevSecOps brings security into every phase of the DevOps lifecycle—early, consistently, and effectively.

    In this session, you’ll discover:

    • What DevSecOps is and why it matters?
    • Learn how to formalize your security concerns into a repeatable process
    • Discover the power of automation through pull requests, approval workflows, segregation of duties, peer review, and more—ensuring your data and production environments are protected without slowing down delivery.

    Whether you’re just getting started or looking to enhance your practices, this session will provide actionable insights to strengthen your security posture through automation and team alignment to bring consistency to the process.

    Watch Now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    PowerTech:  2011 Security Event of the Year. September 22–23 in Las Vegas. RVSP today!
    New Generation Software:  BI comes in many flavors. Get info and FREE ice cream!
    System i Developer:  Join the Gurus at the RPG & DB2 Summit in St. Louis, October 17-19

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    The SAP App Giant Rises in Q2 Adobe Flash Builder for the iSeries Programmer, Part 1

    Leave a Reply Cancel reply

Volume 11, Number 25 -- August 9, 2011
THIS ISSUE SPONSORED BY:

Help/Systems
ASNA
Bug Busters Software Engineering
Computer Keyes
CNX

Table of Contents

  • IBM i Server Gets Hip to QR Codes
  • VAI Gets Social with New Release of S2K Sales Force
  • IBM’s Multi-Faceted Mobile Strategy
  • Three IBM i Solution Editions Unveiled by Infor, IBM
  • ClearPointe and EView Pair Up for Remote Management of IBM i Servers
  • Kisco Hooks WebReport/400 to Apache for Intranet Serving
  • DRV Sets Sites on International Expansion
  • Language Barriers Broken, mrc Says
  • Swiss Bank Adopts Linoma’s IBM i Encryption Tool
  • JD Edwards World Training Brought Back by JDEtips

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • What You Will Find In IBM i 7.6 TR1 and IBM i 7.5 TR7
  • Three Things For IBM i Shops To Consider About DevSecOps
  • Big Blue Converges IBM i RPG And System Z COBOL Code Assistants Into “Project Bob”
  • As I See It: Retirement Challenges
  • IBM i PTF Guide, Volume 27, Number 41
  • Stacking Up Power11 Entry Server Performance To Older Iron
  • Big Blue Boosts IBM i Support In Instana, Adds Tracing
  • It Is Time To Tell Us What You Are Thinking And Doing
  • IBM i PTF Guide, Volume 27, Number 40
  • The GenAI Boom Is Only Slightly Louder Than The Dot Com Boom

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle