• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Considerations For Implementing Encryption On IBM i

    February 18, 2015 Leo Salvaggio

    Although it started out as a technology aimed at the financial industry, data encryption has become the standard among all industries. Think about it: health records, social media accounts, and state and local records all contain personal information. At the same time, security breaches are becoming commonplace.

    According to the “2014 Cost of Data Breach Study: United States” by IBM and Ponemon Institute, the total average cost of a data breach is $5.9 million. That is a big price tag for an organization to pay for something that could have been prevented. That cost does not even take into consideration money lost from the lack of confidence from consumers after a breach. The good news is, IBM i shops have options when it comes to encryption and other security measures.

    Before encryption, data was stored on rotational hard drives and could be read by anyone with access. In an encrypted scenario, the data written on the disk is jumbled using unique algorithms. In this encrypted format, if someone gains access to a hard drive, the data isn’t usable without an encryption key. This is essentially the last line of defense in protecting data.

    Hardware or Software Encryption

    Data encryption plays well into the greater security and data storage discussion. IBM i shops should consider a layered approach, examining the entire data storage and security infrastructure within an organization. There are two ways that data can be encrypted on a storage mechanism: with software or hardware. IBM i shops have options for both.

    Software-based encryption offers flexibility in what the IBM i organization deems encryption-worthy and also allows flexibility in the method of storage. Whatever backup process is currently implemented, software encryption can be incorporated into almost any system.

    On the flip side, software-based encryption can put a high performance demand on servers. Implementation of encryption software could require a server upgrade. Also, depending on which encryption service an IBM i shop implements, there could be some additional equipment fees to connect the system to the network.

    Alternatively, IBM i shops may choose to incorporate encryption protection through a hardware device. This type of encryption is built into physical equipment. Typically, hardware-based encryption does not lead to any system degradation or require improved server operations. By utilizing a hardware-based encryption implementation, server host cycles are not burned up in the encryption process as they are in a software-based scenario. This allows the host to dedicate resources to the core application. Hardware-based encryption also does not burden the system with a high overhead processor drain on performance.

    Whether choosing hardware- or software-based encryption, it is important to ensure that both data at rest and data in flight are encrypted. Data at rest is typically protected by whichever storage media your data storage solution utilizes. An example of this is VTL. If you are using a virtual tape library as your primary backup solution, encryption algorithms are developed, all of which are managed by the virtual tape solution.

    Utilizing the VTL to manage your encryption needs has several advantages. The first advantage allows for secure offsite replication to a remote location. Primary copies of the data are written to the VTL and either through policy, watermark or timestamp those volumes can be written to a remote location via your IP network. While in transit across your IP network, the data is encrypted and compressed allowing for a secure method of transmission and compliance.

    Another benefit to VTL encryption is compliance, which is native to VTL solutions; operators have the capability to export virtual tape volumes to physical tape volumes, which reside in an encrypted state. The VTL manages encryption keys and does not impact the host cycles throughout this process.

    What Requires Encryption?

    Determining what data needs to be encrypted really boils down to policies inside an organization and the value of data. PowerPoint presentations and Word documents, for example, are usually not critically important or sensitive. As a result, those should be segmented appropriately on your network. On the other hand, information that’s part of your CRM package, your accounting software, financials, customer data, and price books are typically items that should reside in an encrypted state.

    In essence, figure out what data in your environment you can’t live without, what’s competitive and sensitive, what’s protected with traditional archival policies, and consider the future direction of your company. Look at those opportunity costs and make a decision from there.

    Encryption should be a part of your IBM i shop’s overall storage discussion. Before making a decision, be sure to think about what kind of impact various solutions will have on your current system. Talk to a trusted storage advisor about any latency concerns and how data encryption options fit into your tiered storage infrastructure and backup solution.

    Leo Salvaggio is a vice president at Dynamic Solutions International (DSI). He has more than 15 years of experience helping businesses find strategic technology solutions for their data storage and management needs. He can be reached at L.Salvaggio@DynamicSolutions.com.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    New Generation Software

    FREE Webinar:

    Creating Great Data for Enterprise AI

    Enterprise AI relies on many data sources and types, but every AI project needs a data quality, governance, and security plan.

    Wherever and however you want to analyze your data, adopting modern ETL and BI software like NGS-IQ is a great way to support your effort.

    Webinar: June 26, 2025

    RSVP today.

    www.ngsi.com – 800-824-1220

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    ASNA:  Turn RPG subfiles into great mobile apps. Free Mobile RPG Webcast. February 19
    Profound Logic Software:  Reach Your Modernization Goals. Register for the February 25 Webinar now!
    System i Developer:  Upgrade your skills at the RPG & DB2 Summit in Dallas, March 17-19

    Conference Puts IBM i System Management In Spotlight IBM Grants After License Amnesty For Software Maintenance

    Leave a Reply Cancel reply

Volume 25, Number 10 -- February 18, 2015
THIS ISSUE SPONSORED BY:

Maxava
BCD
COMMON
Computer Keyes
LaserVault

Table of Contents

  • Five IBM i Facts That Will Surprise Your CIO
  • RPG Programmer Shortage Blamed For CSC’s Earnings Miss
  • iFD Streamlines Document Workflow With New Product
  • Considerations For Implementing Encryption On IBM i
  • CYBRA Getting Creative With RFID Solutions

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle