Posts Tagged Data Security

Linoma Software Team is Hitting the Road

Posted by on Monday, 18 February, 2013

February kicks off a busy trade show season for Linoma Software, and we’re looking forward to meeting lots of new people.

We’re also hoping to connect with current customers to see if we can get your thoughts about Linoma Software products.  We’ll be shooting customer videos at several shows and we’re hoping to include customers from a wide variety of industries.  Please contact us if you will be attending any of these shows.

Our first stop is at the RSA Conference in San Francisco from Feb. 25-28, where we’ll be networking with security professionals from around the world.  We’ll be exhibiting at Booth #242 from Monday through Thursday.

Then, we have a few weeks until we head to Atlanta for the RPG & DB2 Summit on March 19 where we’ll also be exhibiting.  It’s a great time to talk to developers in the trenches to see what’s changing and find out how we can better serve their needs.

Linoma Software trade showTwo weeks later we go south again, this time to Austin, Texas for the COMMON User’s Group Annual Meeting and Exposition, April 7-10.  Not only are we looking forward to catching up with industry colleagues and making new connections, we’re also excited to be in such a fun and vibrant city.  We’ll be set up in Booth #500 and hope to see a lot of familiar faces there.

Orlando, Florida our next stop on our spring trade show tour, where we’ll again be rubbing elbows with the data security experts at InfoSec World from April 15 to April 17.  We’ll have our display set up in Booth #109 to showcase how GoAnywhere helps simplify, automate and secure data transfers.

We’re also sending one of our team to London at the end of April to support our UK distributors at InfoSecurity Europe.  Brian will be meeting with several of our partners in England, France and elsewhere to see how we can support their sales and marketing efforts.

The last big tradeshow of the spring is FOSE, a conference designed exclusively for government technology professionals. Held in conjunction with the Government Security Expo,  FOSE takes place May 14-16 in Washington D.C., and we’ll be exhibiting in Booth #640.

If you’re planning to attend any of these shows, please let us know, or stop by our booth.  You can register to win prizes, pick up some cool giveaways, and maybe spend a few minutes on video telling us what you like about working with Linoma.  We really hope to see you!

 

Susan Baird

Susan is the Marketing Manager at Linoma Software, helping promote our secure file transfer and encryption solutions. Her specialty is content creation and social media marketing, and you can find out more about her by viewing her LinkedIn profile.

More Posts - Website - Twitter - Facebook

Upcoming Webinar: Focus on FTP Server Compliance

Posted by on Wednesday, 23 January, 2013

Don’t miss our upcoming live webinar led by Chief Architect Bob Luebbe!

Get Your FTP Server in Compliance

Thursday, January 31 at Noon Central

Secure FTP Server Compliance WebinarWith the recently added rules for the Healthcare Insurance Portability and Accountability Act (HIPAA) that now holds trading partners and business associates accountable if they also handle patient data, it’s a good time to review whether your FTP server is updated and ready to meet compliance requirements. Learn how to keep your data as well as trading partner files protected within your network and still allow external access without opening inbound network ports.  You can also see a demo of Linoma Software’s GoAnywhere™, a managed file transfer solution that includes a secure FTP server and a reverse proxy DMZ gateway with clustering and load balancing capabilities to ensure high availability.

Learn more


 

IBM i Encryption Made Easy with DB2 Field Procedures

Now Available On Demand

IBM i 7.1 DB2 Field Procedures, data encryptionDuring this recorded webinar, you can learn about how to make the DB2 Field Procedures Tool in IBM version 7.1 work even more efficiently as part of a more comprehensive solution, one that makes it easier to implement encryption, manage keys, and generate auditing reports so important for meeting compliance regulations like HIPAA and PCI DSS,.  You can also see a demo of Linoma’s popular encryption software Crypto Complete.

Learn more


All of our webinars are recorded, so if you register and are not able to attend live, you’ll be able to review the webinar at a more convenient time.

We look forward to having you join us and will be happy to answer any questions you have.

 

 

Susan Baird

Susan is the Marketing Manager at Linoma Software, helping promote our secure file transfer and encryption solutions. Her specialty is content creation and social media marketing, and you can find out more about her by viewing her LinkedIn profile.

More Posts - Website - Twitter - Facebook

Simplify Field Encryption on IBM i

Posted by on Monday, 5 November, 2012

Now that corporate applications are easier to access via remote and mobile channels, it’s even more important to determine which sensitive data is accessible and where possible breaches may occur. Unfortunately, legions of hackers with Wi-Fi and mobile hacking tools make it imperative that organizations prepare for and defend against potential attacks with even more pervasive security procedures.

One step in creating a stronger defense is to employ field or column-level encryption to protect sensitive data at rest.

Implementing a custom field encryption project on IBM i used to be a notoriously long and painful process.  Programming code changes for field level encryption required a steep learning curve, costly programming resources, and even more time in testing, validating and updating the changed application source code. Most companies simply could not justify the additional strain on their budgets for this level of project development requirements.

In response to this challenge, IBM released its OS version 7.1 with DB2 field procedure (FieldProcs) in April of 2010 that greatly simplified the field encryption process.  With the new FieldProcs technology, encryption projects can be streamlined because the field procedures are invoked at the database level, making it transparent to the applications. The FieldProcs can be coded to automatically encrypt the field on Inserts and Updates, and subsequently decrypt the field only for authorized users on Read operations.  Subsequently, FieldProcs have become very important to those businesses that have legacy applications and limited budgets.

FieldProcs are a great step for improving the viability of field level encryption projects. But even with this, many companies don’t have the resources to integrate and manage the FieldProcs which is why third-party software solutions, like Linoma Software’s Crypto Complete, are valuable.  Crypto Complete will generate and manage the FieldProcs on the fields within the files.

Crypto Complete also includes the key management, audit logs and access controls needed for PCI DSS and data privacy compliance. The value of using Crypto Complete for field encryption cannot be understated as it can greatly minimize the learning curve and reduce the implementation resource requirements from weeks to hours.

Daniel Cheney

Daniel has been the IT Director at a healthcare company for the last 12 years and a longtime beneficiary of GoAnywhere Director and the IBM i platform. He is also a freelance writer for various technical and social media projects.

More Posts - Website

Tokenization: A Powerful Weapon Against Cyber Attack

Posted by on Thursday, 19 April, 2012

Tokenization in the data security world is the process of moving sensitive data from a company network to a separate location or sever, and replacing and referencing that data on the company server with a unique token.

If hackers attempt to access sensitive information like credit card numbers from a server, they’ll instead encounter the token which prevents them from finding the original data without a specific encryption key or knowledge of the tokenization system.

Linoma Software GoAnywhere Managed File Transfer SolutionFor example, say a merchant acquires a credit card number by swiping a customer’s card with a card reader.  If the merchant has implemented tokenization, this card number information is immediately replaced in the merchant’s database by a token number while the actual card number is sent and stored (in encrypted form) at a different location, along with the reference from the token.

Because the actual card number is never stored in the merchant’s front-end system, hackers have a much more difficult time stealing it. Customers can therefore be assured that it is safe to let that merchant use their card information because the actual credit card numbers are not stored in an easily accessible location.

All organizations that capture credit card data are required by the PCI DSS government regulations to secure and protect this data.  Originally, this presented a challenge to the payment industry until Shift4 Corporation presented tokenization solutions at an industry Security Summit in 1995.  The adoption of tokenization became a popular solution to meet the PCI DSS compliance regulations.

>>Check out these white papers discussing PCI DSS compliance issues, and data breach threats

Other industries are beginning to adopt tokenization to protect confidential information such as banking transactions, medical records, criminal records, vehicle driver information, loan applications, stock trading and voter registration.

Finding the most efficient way to implement tokenization is challenging, but the growing threat of cyber attack and the expense of data breach have motivated IT shops to research options in earnest.

A variety of third-party software solutions, such as Linoma Software’s Crypto Complete, deliver tokenization tools as well as additional options for managing encryption keys, audit logs, message alerts; storing tokenized data; automatically assigning token identifiers; and providing a central management platform for the entire tokenization process.

When a greedy hacker in anticipation of scoring a cache of customer credit card data finds instead a series of tokens, companies win another battle in the war against cyber thieves.

Daniel Cheney

Daniel has been the IT Director at a healthcare company for the last 12 years and a longtime beneficiary of GoAnywhere Director and the IBM i platform. He is also a freelance writer for various technical and social media projects.

More Posts - Website

1.800.949.4696  |  sales@linomasoftware.com  |  privacy policy
Copyright ©1994 - 2012 Linoma Software  |  All rights reserved