Field Encryption on the IBM i just got easier.
SQL Field Procedures are a new DB2 feature in version 7.1 that allows a user-specified “exit” program to be called whenever data is read from, inserted into, or updated in a field (column). This is somewhat similar to database column triggers; however there are two distinct advantages:
- Field Procedures allow data to be modified on a Read operation, which allows the exit program to automatically decrypt the field value before it is returned to the customer’s application.
- Field Procedures provide a separate internal space to store the encrypted version of the field value. This allows organizations to encrypt numeric fields such as packed decimal, signed decimal and integer data types without having to store the encrypted values in a separate file.
While IBM provided the hooks into the database with Field Procedures, they rely on 3rd party vendors like us to provide the encryption functions and key management. Linoma worked closely with IBM to test the new Field Procedures and provide feedback to their development team during the early release beta program for 7.1. This also allowed Linoma sufficient time to fully integrate Field Procedures into Crypto Complete for readiness when i 7.1 ships.
We’re excited about Field Procedures since it will allow customers to implement column-level encryption on the IBM i without modifying their applications. This is especially important if a customer is running a canned application and/or does not want to modify their source code.
Personal data privacy is one of the greatest concerns individuals have when doing business over the web and in person. It seems it is commonplace for a company to notify their customers that their personal and/or account information has been compromised by a hacker or a disgruntled employee (e.g. TJ Maxx, Wells Fargo, Bank of America). While you’d think businesses would do everything they can to protect their customers’ personal information, they will weigh the risks and likelihood of a data breach happening versus the cost and time to implement such security measures. Knowing this, the payment card industry (PCI), government agencies and many states have put together a list of requirements that businesses must follow in order to do business with them or in their state. The problem is they often don’t enforce these regulations and fines are only imposed after a data breach happens.
I just returned from Framingham, Massachusetts where we exhibited at the Northeast User Group conference. Massachusetts has a very strict data privacy law. Not only do businesses in Massachusetts need to protect their customers’ personal information but so do businesses who have in their database the personal identifiable information of people from Massachusetts. One of the requirements says organizations must:
“Encrypt all transmitted records and files containing personal information that will travel across public networks.”
Several of our customers mentioned our products have helped them meet the Massachusetts’ data privacy requirements. They have implemented field encryption using Crypto Complete and are using our GoAnywhere Director to encrypt file transfers. They have minimized the risk of a data breach happening at their company by using both solutions. Unfortunately, I also had many other individuals stop by Linoma’s Booth who said their management does not want to allocate any resources (time or money) towards securing personal and confidential data. They know they should do it and are required to do so, but it’s just not high on their priority list right now. I’m afraid this mindset may be more popular than we think, which is concerning.
Is the company you work for securing personal data? Is your company looking for a solution to secure data? Find out today how we can help your company avoid sending the inevitable letter that your confidential information has been breached. Not only can we help you avoid facing public humiliation, our products can help save you time and money by streamlining the secure data transfer process.
If you are interested in seeing how Linoma’s solutions can encrypt your data at rest and when it’s transferred, don’t hesitate to contact us at 800-949-4696.