Linoma Software was happy to be part of COMMON’s 50th Anniversary Conference. Linoma has been attending COMMON for 14 years and was happy to see many familiar faces. The weather in Orlando was beautiful and the conference was well-attended. For those of you unfamiliar with COMMON, it is the world’s largest community of IBM midrange users providing information, education, and networking among users, IBM, and related third-party solution providers. Linoma continues to develop its well-known IBM i products as well as broaden its scope by enhancing products such as GoAnywhere and Crypto Complete.
During the show, Linoma provided demos as well as conducted a survey. According to our results, 44.1% of companies are storing personal identifiable info (e.g. SSNOs, birth dates) “in the clear,” 25% are sending sensitive data unencrypted over the internet, and 48.8% of the companies interviewed are sending unencrypted backups off site. If your company is among the percentage who is not securing sensitive data be sure to contact us at email@example.com and we can evaluate which product would most suit your industry needs.
In case you missed it, Debby Gaffney of Fidelity International, was the winner of our prize give-away…an iPAD! Linoma will be attending COMMON, October 4-6, 2010 in San Antonio Texas. We hope to see you there!
Visit Linoma’s facebook page to see photos of the conference.
Field Encryption on the IBM i just got easier.
SQL Field Procedures are a new DB2 feature in version 7.1 that allows a user-specified “exit” program to be called whenever data is read from, inserted into, or updated in a field (column). This is somewhat similar to database column triggers; however there are two distinct advantages:
- Field Procedures allow data to be modified on a Read operation, which allows the exit program to automatically decrypt the field value before it is returned to the customer’s application.
- Field Procedures provide a separate internal space to store the encrypted version of the field value. This allows organizations to encrypt numeric fields such as packed decimal, signed decimal and integer data types without having to store the encrypted values in a separate file.
While IBM provided the hooks into the database with Field Procedures, they rely on 3rd party vendors like us to provide the encryption functions and key management. Linoma worked closely with IBM to test the new Field Procedures and provide feedback to their development team during the early release beta program for 7.1. This also allowed Linoma sufficient time to fully integrate Field Procedures into Crypto Complete for readiness when i 7.1 ships.
We’re excited about Field Procedures since it will allow customers to implement column-level encryption on the IBM i without modifying their applications. This is especially important if a customer is running a canned application and/or does not want to modify their source code.