Home » Blog


Posts Tagged with "IT"

Linoma Software celebrates 20 Year Anniversary

Linoma Software-20 Year-FINALLinoma Software is celebrating 20 years in helping organizations around the world to automate their IT processes and protect sensitive data. The company will commemorate this milestone anniversary with the much anticipated unveiling of their new corporate headquarters, groundbreaking new software releases and promotional events throughout the next twelve months.

"From the beginning, our goal has been to provide great products at affordable prices that are backed with unparalleled customer support and service," said Linoma Software founder, Bob Luebbe. "We attribute our success over the last 20 years to this simple company philosophy. It encompasses all that we do."

Looking Back: A Modest Beginning

Husband and wife team, Bob and Christy Luebbe, started Linoma out of their home in 1994 to provide IT consulting and contract programming services to area businesses. The concept was simple, in that they offered experienced IT talent for affordable rates.

By late 1995, the Luebbes had hired several consultants to service their expanding customer base which included Fortune 500 companies such as Union Pacific, First Data Resources and Hewlett-Packard. They also officially opened their first office in Omaha, Nebraska to offer offsite programming services to out-of-state customers.

Around 1996, Bob had an idea for a product that addressed the challenge of converting legacy IBM RPG code to the new RPG IV (ILE RPG) language. During his off hours, Luebbe built the Convert to ILE RPG software, named it CVTILERPG and released it on a programming list server as a downloadable file. This proved to be a move that was ahead of its time as most software for IBM systems was distributed by mail and installed using cumbersome tapes.

BobLuebbeLinomaSoftwareCVTILERPG became an overnight success as a convenient-to-install and affordable utility, which paved the way for Linoma to evolve into a software company. Many of the original users of CVTILERPG (now called RPG Toolbox) are still loyal customers today.

Finding ways to make tasks easier and more efficient has always been the core of Linoma Software's approach to software development. From creating graphical interfaces for the AS/400 in 1997 with Surveyor/400, to the debut of Transfer Anywhere in 2002, to encrypting databases with Crypto Complete in 2007, Luebbe and his growing R&D team continued to innovate and streamline processes for the IBM i. As new products were developed and released, Linoma put an emphasis on affordability and five-star support, which the company is known for.

The release of GoAnywhere Director in early 2008 was a turning point for the company. Quickly becoming the flagship product for Managed File Transfer and secure data exchange, the multi-platform software delivered full automation, encryption and detailed audit trails for file transfers. Following shortly after in 2009, the introduction of GoAnywhere Services expanded the product offering to support secure file services using FTP, FTPS, SFTP and HTTP protocols. GoAnywhere Gateway joined the product suite in 2010 with enhanced forward and reverse proxy to protect files in the DMZ.

LinomaSoftware2014 Looking Forward: Success through Innovation

As the GoAnywhere software suite continues to grow and evolve, the company has grown as well. Linoma Software has been named to the Inc. 5000 list of top growing companies in Nebraska for the past two years. Their customer base consists of over 3,000 installations worldwide including government entities, large corporations and mid-sized companies. Boasting over a 98% customer retention rate, Linoma Software continues to win customers over through innovation, affordable product offerings and responsive product enhancements.

According to Luebbe, "Several of our customers have been with us since the beginning. They love the products and rave about our support. We're thrilled to be celebrating 20 years and it's because our customers truly appreciate what we do. Without their trust and support, we wouldn't be here. It's that simple, and we are truly grateful."

Click to Download and Print PDF

Linoma Software products are not affected by Heartbleed bug

Heartbleed bug graphic from heartbleed.comIf you are a Linoma Software customer using any of our products such as the GoAnywhere suite (Director, Services, Gateway, Open PGP Studio), Crypto Complete, Surveyor/400 or the RPG Toolbox, we are pleased to report that our products are NOT vulnerable to the Heartbleed bug.

The CVE-2014-0160 exploit, or Heartbleed bug, has made big headlines over the last 48 hours. The Heartbleed bug exploits vulnerabilities in the popular OpenSSL server software potentially allowing the memory of SSL/TLS encrypted systems to be compromised. The bug essentially allows access to the memory of the SSL/TLS protected systems and attackers can potentially steal and read formerly encrypted information such as usernames and passwords, credit card numbers and other sensitive data. To learn more about the Heartbleed bug please visit Heartbleed.com. Additional resources allow you to check and see if your website or server is affected by the Heartbleed bug: Heartbleed Test and LastPass Heartbleed Checker.

GoAnywhere Suite (Director, Services, Gateway, Open PGP Studio) GoAnywhere does not use native libraries for SSL/TLS and relies on the JSSE libraries of the JVM that GoAnywhere is running on. This exploit does not exist in the JSSE implementation of SSL/TLS. While Tomcat does, however, have the ability to utilize native SSL/TLS capabilities for its HTTP/S connections with the APR Connectors, GoAnywhere does not employ this functionality. GoAnywhere Secure File Transfer mobile apps: For Apple devices: The GoAnywhere Apple app uses the Secure Transport implementation of SSL/TLS and is not affected by Heartbleed. For Android devices: The GoAnywhere Android app uses the JSSE implementation of SSL/TLS and is not affected by Heartbleed.

Surveyor/400: Surveyor/400 does not use native libraries for SSL/TLS and relies on the JSSE libraries of the JVM that Surveyor/400 is running on. This exploit does not exist in the JSSE implementation of SSL/TLS.

Crypto Complete: Crypto Complete does not use SSL/TLS for Field or Backup encryption and is not affected by Heartbleed.

RPG Toolbox: Our RPG toolbox does not use any encryption and is not affected by Heartbleed.

Linoma Software and HealthIT Security Partner on HIPAA Best Practices Guide

SystemiDeveloper_logoAt Linoma Software we understand the importance and challenges of HIPAA compliance. Whether your organization has been compliant with the HIPAA Omnibus Rule for months or it's still shoring up some compliance gaps, there are likely tips you've picked up along the way.

Our partnership with HealthIT Security allows us to bring timely and actionable information to healthcare IT professionals and executives. This HIPAA Best Practices Guide uses expert analysis and industry expertise to focus on exactly what will be expected technically, administratively and policy-wise among HIPAA covered entities and business associates (BAs) during potential audit scenarios.

With the estimated cost of compliance falling around $14.5 million annually, regulated healthcare businesses can't afford HIPAA non-compliance with PHI.

If you have a regulated healthcare business, learn how the HIPAA Onmibus Rule could affect you and how to protect your company by ensuring your forms, files, policies and procedures are 100% HIPAA compliant.

Click here to download the HIPAA Best Practices Guide today.

Linoma Software Salutes Its Big Winners At RPG & DB2 Summit 2014

Linoma Software's Ron Byrd made his annual trek to Dallas for the RPG & DB2 Summit 2014. The event is a tremendous opportunity to meet with IBM i professionals.

Part of the IBM i community since 1994, we enjoy talking with customers and attendees about our full line of data management tools. At this year's Summit, Ron rewarded visitors to our booth with a chance to win valuable prizes and Susan Gantner with System i Developer helped with the drawing.

The three lucky attendees were:
  • James Huang, Core-Mark
  • Ted Poskey, Hochheim Prairie Ins.
  • Lynn Laber, Nodak Mutual Ins.

We'd like to thank everyone who stopped by to talk with Ron, and a special salute to the winners of our drawing. Also a big shout out to everyone at System i Developer, and the sponsors, for putting on a fantastic event.


From RPG Toolbox, Crypto Complete and Surveyor/400 for iSeries to the family of GoAnywhere secure file transfer products there's a solution for everyone at Linoma Software. Contact us today to learn more.

Stop by our booth at the COMMON Annual Meeting and Exposition, May 4-6 in Orlando. See you there.  

RPG & DB2 Summit - JamesHuang
Susan Gantner of System i Developer, prize winner James Huang with Core-Mark and Ron Byrd from Linoma Software.

RPG & DB2 Summit - TedPoskey
Ted Poskey, Hochheim Prairie Insurance (right).

RPG & DB2 Summit - TedPoskey
Lynn Laber, Nodak Mutual Insurance (right).


Data Breaches Threaten Companies Worldwide

As technology staffs contend with ongoing changes to the data distribution landscape, it is important to keep abreast of data security risks and to understand the significant importance of properly managing customer's private data.

data breachThe Ponemon Institute recently released its annual data breach report which provides stats on data security issues and trends. With more than 277 companies involved and 1400 individuals interviewed, this report provides a current and unique perspective of potential security risks associated with even the smallest data breach.

Below are highlights of the report which indicates data breaches remain a difficult challenge.

  • The report identifies three key causes of data breaches worldwide:
    • Malicious Attacks - 37%
    • Negligence - 35%
    • System Errors - 29%
  • The average per capita costs of a data breach increased to $136 per capita over the $130 per capita from the previous year.
  • The US had the highest total per incident cost of $5,403,644.
  • In 2013 the average number of breached records was 23,647
  • Healthcare, Financial and Pharmaceutical industries continue to be the top industries with the highest per capita costs incurred.
Ironically, the report noted that organizations that notified victims too soon following a data breach actually incurred higher costs. This is an indication that an incident management plan should be in place to properly mitigate the data breach event.

It's clear, based on the data in this report, that companies need to look beyond technology solutions that secure systems and communications. It is important that the human factors are considered like employee training and creating an incident management plan to provide a full proof data security strategy.

Take a look at the full 2013 Ponemon Institute Data Breach report for more information on the top reasons that data breaches occurred and ways to decrease the risks and costs associated with them.

For information on how your company can build a better strategy to avoid data breaches, download our free white paper "Defending Against Data Breach: Developing The Right Strategy for Data Encryption."


Linoma Posts Another Year of Record Growth

We've had lots of reasons to celebrate lately at Linoma Software, and here are just a few.

Sales Are Soaring

GoAnywhere, Crypto Complete, Surveyor 400, RPG ToolboxThanks in no small part to having well designed and executed products and a superior support team, our enthusiastic sales team spent 2012 shattering sales records, and have already topped themselves in the first quarter of 2013. We've been able to help customers from virtually every industry, including healthcare, finance and banking, insurance, manufacturing, education, retail, and government, and as we hear back from them about how GoAnywhere or Crypto Complete or Surveyor or RPG Toolbox has made their lives easier and their data more secure, we can share their stories with others seeking an affordable, enterprise-level solution.

Trade Show Season Is In Full Swing

We've already met lots of new people -- and reconnected with old friends -- at the RPG Summit, RSA Conference, COMMON, and InfoSec in Orlando, and this weekend we're exhibiting with HANDD Business Solutions, one of our partners in the UK, at InfoSec Europe. Then, we're first-time exhibitors at the FOSE government conference in Washington D.C. in May and then we're back in Europe for the COMMON-Europe conference in June.

We've Launched a New Website

If you haven't visited our new GoAnywhere.com website yet, you should check it out. Our team worked very hard to redesign not only the look and feel, but also the navigation to make it easier for visitors to find what they need. We hope you'll take a look and let us know what you think.

GoAnywhere OpenPGP Studio is Now Available

Last month we published a free desktop tool that can encrypt and decrypt files using OpenPGP encryption. It's a great solution for those who need to occasionally encrypt files, and OpenPGP Studio also helps organize and manage keys. You can download OpenPGP Studio for free here.

We've also added some new faces to our team and are working on some pretty cool software enhancements as well as our first mobile app, which should be available very soon.

As always, we welcome your ideas and your feedback, and if you've got a great story to share about how one of our products has helped you work more efficiently or kept your data better protected, let us know. We'd love to hear it!



Our Customer Reviews Are Making Headlines

Over the last few months, we've been building a video library of customer reviews for our GoAnywhere Managed File Transfer solution. GoAnywhere simplifies, automates and secures file transfers across most platforms, including IBM i, Windows, Linux, UNIX, AIX and more.

IT JungleIn today's issue of IT Jungle's Four Hundred Stuff, Alex Woodie takes a closer look at these customer success stories. Customers include AAA Cooper Transportation, American Fidelity and Liberty Insurance (AF&L), BlueGrass Mailing, Londen Insurance, Monterey Mushrooms, P.C. Richard and Son, and United Security, Life, and Health.

We've also been getting lots of feedback on our video showcasing the rave reviews our customer support team is getting. Given that our top priorities are creating superior products and delivering exceptional customer service, it's gratifying to get these kinds of comments from our customers.

If you'd like to share your experience with Linoma Software, we'd love to hear from you! You can leave a comment on LinkedIn or on Google+, or you can contact us about doing a case study or video. And, if you have questions or want more information about any of our products, please let us know.


Upcoming Webinar: Focus on FTP Server Compliance

Get Your FTP Server in Compliance

Revised - Watch the Latest Webinar Recording

With the recently added rules for the Healthcare Insurance Portability and Accountability Act (HIPAA) that now holds trading partners and business associates accountable if they also handle patient data, it's a good time to review whether your FTP server is updated and ready to meet compliance requirements. Learn how to keep your data as well as trading partner files protected within your network and still allow external access without opening inbound network ports. You can also see a demo of Linoma Software's GoAnywhere™, a managed file transfer solution that includes a secure FTP server and a reverse proxy DMZ gateway with clustering and load balancing capabilities to ensure high availability.


IBM i Encryption Made Easy with DB2 Field Procedures

Now Available On Demand

IBM i 7.1 DB2 Field Procedures, data encryptionDuring this recorded webinar, you can learn about how to make the DB2 Field Procedures Tool in IBM version 7.1 work even more efficiently as part of a more comprehensive solution, one that makes it easier to implement encryption, manage keys, and generate auditing reports so important for meeting compliance regulations like HIPAA and PCI DSS,. You can also see a demo of Linoma's popular encryption software Crypto Complete.

Learn more

All of our webinars are recorded, so if you register and are not able to attend live, you'll be able to review the webinar at a more convenient time.

We look forward to having you join us and will be happy to answer any questions you have.



Simplify Field Encryption on IBM i

Now that corporate applications are easier to access via remote and mobile channels, it's even more important to determine which sensitive data is accessible and where possible breaches may occur. Unfortunately, legions of hackers with Wi-Fi and mobile hacking tools make it imperative that organizations prepare for and defend against potential attacks with even more pervasive security procedures.

One step in creating a stronger defense is to employ field or column-level encryption to protect sensitive data at rest.

Implementing a custom field encryption project on IBM i used to be a notoriously long and painful process. Programming code changes for field level encryption required a steep learning curve, costly programming resources, and even more time in testing, validating and updating the changed application source code. Most companies simply could not justify the additional strain on their budgets for this level of project development requirements.

In response to this challenge, IBM released its OS version 7.1 with DB2 field procedure (FieldProcs) in April of 2010 that greatly simplified the field encryption process. With the new FieldProcs technology, encryption projects can be streamlined because the field procedures are invoked at the database level, making it transparent to the applications. The FieldProcs can be coded to automatically encrypt the field on Inserts and Updates, and subsequently decrypt the field only for authorized users on Read operations. Subsequently, FieldProcs have become very important to those businesses that have legacy applications and limited budgets.

FieldProcs are a great step for improving the viability of field level encryption projects. But even with this, many companies don't have the resources to integrate and manage the FieldProcs which is why third-party software solutions, like Linoma Software's Crypto Complete, are valuable. Crypto Complete will generate and manage the FieldProcs on the fields within the files.

Crypto Complete also includes the key management, audit logs and access controls needed for PCI DSS and data privacy compliance. The value of using Crypto Complete for field encryption cannot be understated as it can greatly minimize the learning curve and reduce the implementation resource requirements from weeks to hours.

What Can We Learn from the LinkedIn Breach?

Today is another unfortunate reminder that no matter the size of a company or its industry, a data breach makes headlines.

Not only does it attract negative attention and erode customer confidence, an announcement that your company's data has or may have been compromised can result in some steep financial penalties. If fines associated with violating regulations like HIPAA or state privacy laws don't get you, potential lawsuits might.

Take LinkedIn, for example. Earlier this month, the social network of business professionals reported that nearly 6.5 million encrypted passwords had been leaked online.

Today, Mashable.com reports that LinkedIn is facing a $5 million civil lawsuit from a user claiming that LinkedIn's security policy violated industry standards for database security.

There really are no lessons for the rest of us to learn from this latest breach, because most of us already know what we're supposed to do.

  • Keep passwords secure, reasonably complex, and change them regularly.data breach
  • Ensure your company is using only the most secure encryption standards like AES or Open PGP.
  • Stay abreast of the latest news and techniques for keeping your company security policies and practices up to date and as impenetrable as possible.
  • Invest in solutions that streamline your data encryption processes, that include comprehensive auditing and reporting tools, and that ensure the security of your data at rest and in motion.

The question is how much longer can you postpone taking these steps to ensure that your company isn't making news next week with an embarrassing and costly data breach?