Archive for August, 2010

Linoma Software Achieves Microsoft Gold Certified Partner Status

Posted by on Monday, 23 August, 2010

Microsoft Gold Certified PartnerLinoma Software, a leading provider of data automation and encryption technologies, today announced that Linoma has achieved Gold Certified Microsoft Partner status with competencies as an ISV – independent software vendor.

As a Microsoft Gold Certified Partner, Linoma Software has demonstrated expertise with Microsoft technologies and has proven its ability to meet customers’ needs. “The certification assures customers that we have the technical knowledge to run and support applications on the Windows operating system,” said Bob Luebbe, Chief Architect for Linoma Software. “The benefits provided through our Gold Certified Partner status will allow us to continue to enhance our solutions and exceed our customers’ growing needs.”

Microsoft Gold Certified Partners represent the highest level of competence and expertise with Microsoft technologies, and work in the closest relationships with Microsoft.  Only partners which demonstrate exceptional performance levels when delivering solutions that integrate with Microsoft technologies, and have a proven ability to meet customers’ needs, are granted Microsoft Gold Certified Partner status. By achieving this status, Linoma Software now has access to specialized training and support from Microsoft, offering a competitive advantage to our clients.

Managed File Transfer Solution is Certified VMware Ready

Posted by on Monday, 9 August, 2010

Linoma Software, a provider of innovative solutions for securing and transferring sensitive data, today announced GoAnywhere Director and GoAnywhere Services have completed testing and validation to receive VMware Ready certification. GoAnywhere Director and GoAnywhere Services are currently the only secure managed file transfer solutions that are VMware Ready certified for virtualized environments.

The VMware certification process requires ISV Partners to implement a full VMware environment and create test logs using VMware’s testing application. After VMware’s careful review, they authorize the application as VMware Ready.

VMware virtualization is trusted by over 190,000 customers for its proven system management and reliability. The goal of server virtualization is to consolidate physical servers – saving power and other infrastructure related costs. “We initiated the certification process for GoAnywhere Director and GoAnywhere Services with VMware to ensure all file transfers and data translation will remain secure within an Enterprise’s private cloud or virtualized environment,” says Dirk Zwart, Director of Technology Alliances at Linoma Software.

“Virtualization doesn’t fit the traditional mold of dedicated servers to handle a corporation’s encryption of sensitive data, secure data transfer or data translation functions,” says Bob Luebbe, Chief Architect at Linoma Software. “There were many variables to consider, but we were pleasantly surprised at how easy it was to implement a full VMware environment. The hosts and virtual servers were easy to manage and move around.”

“GoAnywhere is an ideal secure managed file transfer solution for companies using virtualized servers,” says Bob Luebbe. “It works with most platforms and provides businesses a secure environment to connect with customers and trading partners.”

Linoma Software tests its software for interoperability with Enterprise-level operating systems – SUSE Linux, Red Hat, Solaris, AIX, HP-UX, i5/OS, Windows, Mac OS X; popular browsers, and compliance with commercial and federal regulations like PCI, HIPAA, and SOX. “Partnering with VMware provides our customers with confidence that they are supported regardless of their configuration,” concludes Dirk Zwart.

Who Insures the Insurer?

Posted by on Monday, 2 August, 2010

Do insurance companies maintain Data Security Breach Insurance?

On June 23, 2010 more than 200,000 Anthem Blue Cross customers received letters informing them that their personal information might have been accessed during a security breach of the company’s website. Customers who had pending insurance applications in the system are currently being contacted because information was viewed through an on-line tool that allows users to track the status of their application. Social Security and credit card numbers were potentially viewed.  It’s one more tumble in a cascade of security breaches that can have terrible consequences for the customers and clients of such a large insurance company.

And of course, this raises an ironic question: Do insurance companies maintain their own liability insurance in the event that their information systems are compromised?  As absurd as it may seem at first glance, it’s really not a laughing matter. According to the Ponemon Institute, the average cost of a security breach is now exceeding $200 per client record.  This would mean that Anthem Blue Cross’s breach last month created a liability as great as $40M.

Moreover, there’s a ripple effect to organizations that do business with insurance companies that suffer such an information security breach.  Each Personnel Department that delivers private employee information to an outside service supplier has an inherent responsibility and liability to its employees.

We all know that the privacy information transferred between companies should use a secure and confidential method of transmission.  Yet too many small and medium-sized companies are still using simple FTP (File Transfer Protocol) software that has been proven to be susceptible to the threats of network hackers.  And by the time these organizations realize their vulnerability, it’s often too late.  These companies are often performing these FTP transfers below the radar of their IT departments.  How does it happen?

Often personnel data is off-loaded to PCs from the main information systems where it is left “in the open” on the hard drives of desktops or laptops. After the data is transferred this residual data is often unprotected, where it’s subject to theft or secondary security flaws. Insurance agents – whose jobs are to facilitate the processing of the data with their insurance providers – can also suffer from such breaches. The loss of an agent’s laptop – through theft, accident, or routine use of USB thumb-drives – poses additional liability.

There are two readily available strategies to help prevent these kinds of security abuses. The first strategy is to use data encryption technologies that not only encrypt the data, but also record into a secure log detailing when, where, and by whom the sensitive data has moved from the main information database.  Linoma’s CryptoComplete offers precisely this kind of encryption capability, and it should be examined by IT professionals as a viable, highly configurable resource for the protection of the company’s information assets.

The second strategy is to use a secure method of transfer for the data itself, ensuring that the information is never left in a vulnerable state on an individual’s personal computer.  By removing FTP access to the data by any employee’s PC and channeling the transfer through the secure corporate server, IT can prevent the problem of network hacking from occurring.  Linoma’s GoAnywhere Director solution is precisely the means of achieving the goal of a secure FTP transfer between companies.

The tragedy of the Anthem Blue Cross breach was the result of a faulty security scheme in the design of its customer service solution.  But it is not the only potential failure of data security that can impact its customers and business partners. And, unfortunately, this information security breach is just one of the 356 million reported breaches that have occurred in the US over the last five years.

So who insures the insurer when a data security breach occurs?  The real answer is IT itself.  And helping IT achieve a better result will be the subject of this blog over the next few months.

Thomas Stockwell

Thomas M. Stockwell is one of Linoma Software's subject matter experts and a top blogger in the industry. He is Principle Analyst at IT Incendiary, with more than 20 years of experience in IT as a Systems Analyst, Engineer, and IS Director.

More Posts - Website

1.800.949.4696  |  sales@linomasoftware.com  |  privacy policy
Copyright ©1994 - 2012 Linoma Software  |  All rights reserved