Linoma Simplifies IBM i Encryption with Crypto Complete 2.51

New Products, Agreements and Trends
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

New version provides improved support for DB2 field procedures available in IBM i 7.1. 

Linoma Software has announced V2.51 of Crypto Complete, which provides IBM i (iSeries) users with more options and better performance for encrypting sensitive data. These encryption enhancements are designed to help organizations easily comply with data privacy requirements including PCI DSS, HIPAA, GLBA, Sarbanes-Oxley, as well as state privacy laws, the company said.

Crypto Complete 2.51 provides improved support for DB2 field procedures (available in IBM i 7.1) for automatic encryption and decryption of database field values. When a field procedure is used to auto-decrypt values, it can now return the masked value to those users who do not have full authority to the field. An authorized administrator can define the masking format and user authorization lists on a per-field basis in Crypto Complete's field encryption registry. With this added masking ability in DB2 Field Procedures, customers can save significant implementation time and costs by not having to make modifications to their application source code.

Backup encryption of IFS files has been greatly improved in Crypto Complete. The performance is significantly faster when encrypting and saving a large number of IFS files and directories, reducing the backup encryption window on the IBM i. Customers can choose IFS files using wildcards and include/exclude criteria within a single Crypto Complete command. One or more directories and subdirectories can be encrypted at a time. The restore/decryption of IFS files is likewise faster and simplified, allowing the selection of individual files and directories from backup media.

Additional enhancements in Crypto Complete version 2.51 include:

  • The ability to limit users with all-object (*ALLOBJ) special authority. Instead of solely relying on IBM’s authority checks for an *ALLOBJ user, Crypto Complete can determine their field-level authorization using individual user and group permission checks.
  • Enhanced support for program adopted authority by allowing the customer to choose if permissions should be cached for authorization lists which are linked to the field.
  • Option to allow the customer to specify the fill value to return when a user is not authorized to the full or masked value for a field. For instance, a social security number could be shown as 999-99-9999 or 000-00-0000 if the user is not authorized to the field.
  • Better support for the double-byte character set, which allows customers in Japan, China, Korea and other Asian countries to automatically encrypt field-level data.

"Crypto Complete can encrypt user data wherever it is stored on the IBM i, including database fields, backups and files on the Integrated File System (IFS)," says Bob Luebbe, chief architect for Linoma Software. “With its integrated key management, security controls, and audit logs, Crypto Complete simplifies encryption and offers a broad set of features for an affordable value.” Crypto Complete is used by IBM i customers around the world including corporations, non-profit organizations, and government entities.

 

Justin Phipps

Founded in 1994, Linoma Software provides innovative technologies for protecting sensitive data and automating data movement. Linoma Software has a diverse install base of over 3,000 customers around the world including Fortune 500 companies, non-profit organizations and government entities. Linoma’s success has been built on being very responsive to its customers' requirements. Suggestions on how the company can improve its products to better serve your organization are always welcome. Readers are encouraged to review the many positive testimonials on the company's web site. Customer references can also be supplied upon request. Linoma Software is dedicated to its install base of enterprise platforms and maintains professional partnerships with user groups, data security policy groups, and operating system companies.


 

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  •  

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: