Compliance regulations like HIPAA and PCI DSS have us all looking for more efficient and secure ways to keep sensitive data protected, especially the personal information fields we’ve all come to rely on: social security numbers, credit card numbers, birth dates, driver’s license numbers, insurance policy ID numbers, etc.
Fortunately, IBM is working hard to meet the growing demands of companies who must store and share private information and compliance auditors who govern how it must be done. When it released IBM i 7.1, it included a feature for encrypting DB2 form fields to give IT staffs more control.
Surprisingly, not everyone is taking full advantage of these DB2 FieldProcs either because they’re not aware of their benefit, or because they’re waiting for an even more comprehensive approach.
If you fall into either of these groups, then we’ve got good news. The Linoma Software team is hosting a webinar next week to share tips for how to maximize the DB2 FieldProcs feature in IBM i 7.1. In addition, we’ll provide some options that could give your processes even more functionality, making things more efficient.
We invite you to grab some lunch and join us for “IBM i Field Procedures Simplified with DB2 Field Procedures“ on June 13 at noon central. There will be lots of opportunities to ask questions, and we’ll also record the webinar so you can share it with your colleagues.
Hope you’ll be able to join us!
Don’t miss our upcoming live webinar led by Chief Architect Bob Luebbe!
Get Your FTP Server in Compliance
Thursday, January 31 at Noon Central
With the recently added rules for the Healthcare Insurance Portability and Accountability Act (HIPAA) that now holds trading partners and business associates accountable if they also handle patient data, it’s a good time to review whether your FTP server is updated and ready to meet compliance requirements. Learn how to keep your data as well as trading partner files protected within your network and still allow external access without opening inbound network ports. You can also see a demo of Linoma Software’s GoAnywhere™, a managed file transfer solution that includes a secure FTP server and a reverse proxy DMZ gateway with clustering and load balancing capabilities to ensure high availability.
IBM i Encryption Made Easy with DB2 Field Procedures
Now Available On Demand
During this recorded webinar, you can learn about how to make the DB2 Field Procedures Tool in IBM version 7.1 work even more efficiently as part of a more comprehensive solution, one that makes it easier to implement encryption, manage keys, and generate auditing reports so important for meeting compliance regulations like HIPAA and PCI DSS,. You can also see a demo of Linoma’s popular encryption software Crypto Complete.
All of our webinars are recorded, so if you register and are not able to attend live, you’ll be able to review the webinar at a more convenient time.
We look forward to having you join us and will be happy to answer any questions you have.
Field Encryption on the IBM i just got easier.
SQL Field Procedures are a new DB2 feature in version 7.1 that allows a user-specified “exit” program to be called whenever data is read from, inserted into, or updated in a field (column). This is somewhat similar to database column triggers; however there are two distinct advantages:
- Field Procedures allow data to be modified on a Read operation, which allows the exit program to automatically decrypt the field value before it is returned to the customer’s application.
- Field Procedures provide a separate internal space to store the encrypted version of the field value. This allows organizations to encrypt numeric fields such as packed decimal, signed decimal and integer data types without having to store the encrypted values in a separate file.
While IBM provided the hooks into the database with Field Procedures, they rely on 3rd party vendors like us to provide the encryption functions and key management. Linoma worked closely with IBM to test the new Field Procedures and provide feedback to their development team during the early release beta program for 7.1. This also allowed Linoma sufficient time to fully integrate Field Procedures into Crypto Complete for readiness when i 7.1 ships.
We’re excited about Field Procedures since it will allow customers to implement column-level encryption on the IBM i without modifying their applications. This is especially important if a customer is running a canned application and/or does not want to modify their source code.