Posts Tagged Crypto Complete

COMMON 2010 – 50th Anniversary

Posted by on Monday, 10 May, 2010

Linoma Software was happy to be part of COMMON’s 50th Anniversary Conference. Linoma has been attending COMMON for 14 years and was happy to see many familiar faces. The weather in Orlando was beautiful and the conference was well-attended. For those of you unfamiliar with COMMON, it is the world’s largest community of IBM midrange users providing information, education, and networking among users, IBM, and related third-party solution providers. Linoma continues to develop its well-known IBM i products as well as broaden its scope by enhancing products such as GoAnywhere and Crypto Complete.

During the show, Linoma provided demos as well as conducted a survey. According to our results, 44.1% of companies are storing personal identifiable info (e.g. SSNOs, birth dates) “in the clear,” 25% are sending sensitive data unencrypted over the internet, and 48.8% of the companies interviewed are sending unencrypted backups off site. If your company is among the percentage who is not securing sensitive data be sure to contact us at info@linoma.com and we can evaluate which product would most suit your industry needs.

In case you missed it, Debby Gaffney of Fidelity International, was the winner of our prize give-away…an iPAD! Linoma will be attending COMMON, October 4-6, 2010 in San Antonio Texas. We hope to see you there!

Visit Linoma’s facebook page to see photos of the conference.

Dirk Zwart

Dirk Zwart writes Linoma Software’s User Guides for the GoAnywhere secure file transfer applications. Dirk’s writing topics have covered everything from hardware manuals, software guides, security policies for compliance projects and reviews of consumer electronics. Follow Dirk and Linoma Software on Linkedin or Facebook/Twitter.

More Posts - Website - Facebook

SQL Field Procedures in IBM i 7.1

Posted by on Tuesday, 20 April, 2010

Field Encryption on the IBM i just got easier.

SQL Field Procedures are a new DB2 feature in version 7.1 that allows a user-specified “exit” program to be called whenever data is read from, inserted into, or updated in a field (column).   This is somewhat similar to database column triggers; however there are two distinct advantages:

  1. Field Procedures allow data to be modified on a Read operation, which allows the exit program to automatically decrypt the field value before it is returned to the customer’s application.
  2. Field Procedures provide a separate internal space to store the encrypted version of the field value.  This allows organizations to encrypt numeric fields such as packed decimal, signed decimal and integer data types without having to store the encrypted values in a separate file.

While IBM provided the hooks into the database with Field Procedures, they rely on 3rd party vendors like us to provide the encryption functions and key management. Linoma worked closely with IBM to test the new Field Procedures and provide feedback to their development team during the early release beta program for 7.1.  This also allowed Linoma sufficient time to fully integrate Field Procedures into Crypto Complete for readiness when i 7.1 ships.

We’re excited about Field Procedures since it will allow customers to implement column-level encryption on the IBM i without modifying their applications.  This is especially important if a customer is running a canned application and/or does not want to modify their source code.

Bob Luebbe

Bob Luebbe has worked in the IT field since 1985. During his career, he has worked in a wide variety of roles including software development, project management, consulting and architecting large-scale applications. Bob has been with Linoma Software since 1994 and is currently serving its Chief Architect. His main focus for the last several years has been developing technologies to help organizations to automate and secure their file transfers, as well as to protect data at rest through encryption and key management.

More Posts - Website