Linoma Releases New Version of Crypto Complete

New Products, Agreements and Trends
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

V2.0 includes enhancements in alphanumeric field encryption, a command to locate unencrypted data, customizable security alerts, role-based field level authority and more. 

Crypto Complete protects sensitive data on the IBM System i (iSeries) using strong encryption technology, integrated key management, and auditing. This robust solution allows organizations to protect confidential information and expedite compliance with PCI DSS standards, federal regulations (e.g., HIPAA, GLBA and Sarbanes-Oxley), and state privacy laws. 

One of the primary features of Crypto Complete is its ability to automatically encrypt database fields such as credit card numbers, Social Security numbers, bank account numbers, etc. Crypto Complete also allows customers to easily encrypt their backups, as well as files on the Integrated File System (IFS). 

The new 2.0 release of Crypto Complete provides significant new enhancements including:

  • The ability to encrypt alphanumeric fields of any length (non-block lengths) without having to change field definitions or store the encrypted values externally.
  • A new command to quickly locate unencrypted sensitive data in database files, such as credit card numbers, Social Security numbers, Canadian Social Insurance numbers, etc.
  • Customizable security alerts. Receive instant notification (via email or system messages) when security-related changes are made or when unauthorized access is attempted in Crypto Complete.
  • Role-based field level authority allows you to control user access to decrypted values, based on i5/OS authorization lists. Based on these authorities, your users can be granted access to either the full values or masked values.
  • Support for automatic encryption of fields contained in multi-member files.
  • Ability to automatically encrypt fields only in certain user-selectable records.
  • Additional SQL functions and stored procedures for encrypting and decrypting data through embedded SQL and remote connections such as ODBC and JDBC.
  • Support for encrypting/decrypting multiple files on the IFS using wildcard names.
  • Formatted audit log reports that can be filtered by user profile, date/time range and audit types. 

In a recent interview, Bob Luebbe, chief architect at Linoma Software, said "We wanted to make it simple for customers to encrypt sensitive data and achieve compliance with PCI and privacy laws. I believe this new 2.0 release of Crypto Complete achieves that goal while providing a strong integrated key management system and detailed audit trails." 

A free, fully-functional 30-day trial of Crypto Complete is available from Linoma Software at www.cryptocomplete.com. Crypto Complete runs on i5/OS releases V5R2 and higher. Pricing starts at $3,995 for a P05 processor group. 

About Linoma Software

Founded in 1994, Linoma Software provides innovative technologies for protecting sensitive data and automating data movement. Linoma Software has a diverse install base of over 3,000 customers around the world including corporations, non-profit organizations and government entities. For more Information, contact Brian Pick, Linoma Software, 402-944-4242 ext 712, This email address is being protected from spambots. You need JavaScript enabled to view it., or visit www.linoma.com

Justin Phipps

Founded in 1994, Linoma Software provides innovative technologies for protecting sensitive data and automating data movement. Linoma Software has a diverse install base of over 3,000 customers around the world including Fortune 500 companies, non-profit organizations and government entities. Linoma’s success has been built on being very responsive to its customers' requirements. Suggestions on how the company can improve its products to better serve your organization are always welcome. Readers are encouraged to review the many positive testimonials on the company's web site. Customer references can also be supplied upon request. Linoma Software is dedicated to its install base of enterprise platforms and maintains professional partnerships with user groups, data security policy groups, and operating system companies.


 

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  •  

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: