Home » Blog

Blog

The latest announcements, insights and commentary from Linoma Software

Five Reasons We Love Tradeshows

We're packing up our displays and stocking up on brochures because this fall, we're on the road again. Our tradeshow schedule is busier than ever, and our team is covering events all over the country.

In the era of virtual meetings, video calling and event streaming, you might wonder why we even bother to exhibit at live conferences.

Here are five reasons we love tradeshows.

1. We meet lots of new people.

It's fun to watch people stroll by our display and see the light bulb go on when they realize that we address issues that have been driving them crazy. It's even better to hear their incredulous reactions when we explain how much easier we can make their jobs. Sometimes they'll tell us about other solutions that have disappointed them, and that's a great opportunity to share how our software might be a better fit.

2. We talk at length with customers.Linoma Software at COMMON

We love when customers stop by our booth. Often we've only talked to them on the phone or through an online meeting, so it's good to meet them in person. Sometimes they have questions that we can solve on the spot, and sometimes they want to get the inside scoop about what's next in the development cycle. Occasionally we can even get them on video sharing their experiences with GoAnywhere or Crypto Complete.

Here's one of our senior developers, Ron Byrd, talking with longtime GoAnywhere customer Jit Sewchan of ScotiaBank.

3. We catch up with industry colleagues.

Tradeshows give us a chance to talk with other IT professionals, software developers, industry media and sales reps who are in the trenches with us. It's helpful to hear others' perspectives about industry trends, and to get caught up on the newest players and products in the space.

4. We have fun.

Yes, the days can be long, but tradeshows aren't all work and no play. When the exhibit hall closes, we always find something fun to do. The team will explore local restaurants, perhaps meet up with customers or colleagues, and we've even been known to track down a foosball table for some serious competition.

5. We sell software.

Obviously it wouldn't be worth the investment if tradeshows didn't benefit the bottom line, and they definitely do. We think our success with tradeshows is because they give us the opportunity to talk with people, to listen to their challenges, and to explain how we believe we can help. Even if we don't turn everyone into customers immediately, we've now given them something to think about when they are ready to find a solution.

Just in case you'll be hitting the tradeshow circuit this fall, here are some of the places you'll be able to find us:

Stop by our booth. We always have chocolate!

 

Data Breaches Threaten Companies Worldwide

As technology staffs contend with ongoing changes to the data distribution landscape, it is important to keep abreast of data security risks and to understand the significant importance of properly managing customer's private data.

data breachThe Ponemon Institute recently released its annual data breach report which provides stats on data security issues and trends. With more than 277 companies involved and 1400 individuals interviewed, this report provides a current and unique perspective of potential security risks associated with even the smallest data breach.

Below are highlights of the report which indicates data breaches remain a difficult challenge.

  • The report identifies three key causes of data breaches worldwide:
    • Malicious Attacks - 37%
    • Negligence - 35%
    • System Errors - 29%
  • The average per capita costs of a data breach increased to $136 per capita over the $130 per capita from the previous year.
  • The US had the highest total per incident cost of $5,403,644.
  • In 2013 the average number of breached records was 23,647
  • Healthcare, Financial and Pharmaceutical industries continue to be the top industries with the highest per capita costs incurred.
Ironically, the report noted that organizations that notified victims too soon following a data breach actually incurred higher costs. This is an indication that an incident management plan should be in place to properly mitigate the data breach event.

It's clear, based on the data in this report, that companies need to look beyond technology solutions that secure systems and communications. It is important that the human factors are considered like employee training and creating an incident management plan to provide a full proof data security strategy.

Take a look at the full 2013 Ponemon Institute Data Breach report for more information on the top reasons that data breaches occurred and ways to decrease the risks and costs associated with them.

For information on how your company can build a better strategy to avoid data breaches, download our free white paper "Defending Against Data Breach: Developing The Right Strategy for Data Encryption."

 

DB2 Field Encryption Has Been Simplified

Compliance regulations like HIPAA and PCI DSS have us all looking for more efficient and secure ways to keep sensitive data protected, especially the personal information fields we've all come to rely on: social security numbers, credit card numbers, birth dates, driver's license numbers, insurance policy ID numbers, etc.

Register for DB2 FieldProcs WebinarFortunately, IBM is working hard to meet the growing demands of companies who must store and share private information and compliance auditors who govern how it must be done. When it released IBM i 7.1, it included a feature for encrypting DB2 form fields to give IT staffs more control.

Surprisingly, not everyone is taking full advantage of these DB2 FieldProcs either because they're not aware of their benefit, or because they're waiting for an even more comprehensive approach.

If you fall into either of these groups, then we've got good news. The Linoma Software team is hosting a webinar next week to share tips for how to maximize the DB2 FieldProcs feature in IBM i 7.1. In addition, we'll provide some options that could give your processes even more functionality, making things more efficient.

We invite you to grab some lunch and join us for "IBM i Field Procedures Simplified with DB2 Field Procedures" on June 13 at noon central. There will be lots of opportunities to ask questions, and we'll also record the webinar so you can share it with your colleagues.

Hope you'll be able to join us!

Linoma Posts Another Year of Record Growth

We've had lots of reasons to celebrate lately at Linoma Software, and here are just a few.

Sales Are Soaring

GoAnywhere, Crypto Complete, Surveyor 400, RPG ToolboxThanks in no small part to having well designed and executed products and a superior support team, our enthusiastic sales team spent 2012 shattering sales records, and have already topped themselves in the first quarter of 2013. We've been able to help customers from virtually every industry, including healthcare, finance and banking, insurance, manufacturing, education, retail, and government, and as we hear back from them about how GoAnywhere or Crypto Complete or Surveyor or RPG Toolbox has made their lives easier and their data more secure, we can share their stories with others seeking an affordable, enterprise-level solution.

Trade Show Season Is In Full Swing

We've already met lots of new people -- and reconnected with old friends -- at the RPG Summit, RSA Conference, COMMON, and InfoSec in Orlando, and this weekend we're exhibiting with HANDD Business Solutions, one of our partners in the UK, at InfoSec Europe. Then, we're first-time exhibitors at the FOSE government conference in Washington D.C. in May and then we're back in Europe for the COMMON-Europe conference in June.

We've Launched a New Website

If you haven't visited our new GoAnywhere.com website yet, you should check it out. Our team worked very hard to redesign not only the look and feel, but also the navigation to make it easier for visitors to find what they need. We hope you'll take a look and let us know what you think.

GoAnywhere OpenPGP Studio is Now Available

Last month we published a free desktop tool that can encrypt and decrypt files using OpenPGP encryption. It's a great solution for those who need to occasionally encrypt files, and OpenPGP Studio also helps organize and manage keys. You can download OpenPGP Studio for free here.

We've also added some new faces to our team and are working on some pretty cool software enhancements as well as our first mobile app, which should be available very soon.

As always, we welcome your ideas and your feedback, and if you've got a great story to share about how one of our products has helped you work more efficiently or kept your data better protected, let us know. We'd love to hear it!

 

 

Our Customer Reviews Are Making Headlines

Over the last few months, we've been building a video library of customer reviews for our GoAnywhere Managed File Transfer solution. GoAnywhere simplifies, automates and secures file transfers across most platforms, including IBM i, Windows, Linux, UNIX, AIX and more.

In today's issue of IT Jungle's Four Hundred Stuff, Alex Woodie takes a closer look at these customer success stories. Customers include AAA Cooper Transportation, American Fidelity and Liberty Insurance (AF&L), BlueGrass Mailing, Londen Insurance, Monterey Mushrooms, P.C. Richard and Son, and United Security, Life, and Health.

We've also been getting lots of feedback on our video showcasing the rave reviews our customer support team is getting. Given that our top priorities are creating superior products and delivering exceptional customer service, it's gratifying to get these kinds of comments from our customers.

If you'd like to share your experience with Linoma Software, we'd love to hear from you! You can leave a comment on LinkedIn or on Google+, or you can contact us about doing a case study or video. And, if you have questions or want more information about any of our products, please let us know.

 

Upcoming Webinar: Focus on FTP Server Compliance

Get Your FTP Server in Compliance

Revised - Watch the Latest Webinar Recording

With the recently added rules for the Healthcare Insurance Portability and Accountability Act (HIPAA) that now holds trading partners and business associates accountable if they also handle patient data, it's a good time to review whether your FTP server is updated and ready to meet compliance requirements. Learn how to keep your data as well as trading partner files protected within your network and still allow external access without opening inbound network ports. You can also see a demo of Linoma Software's GoAnywhere, a managed file transfer solution that includes a secure FTP server and a reverse proxy DMZ gateway with clustering and load balancing capabilities to ensure high availability.


 

IBM i Encryption Made Easy with DB2 Field Procedures

Now Available On Demand

IBM i 7.1 DB2 Field Procedures, data encryptionDuring this recorded webinar, you can learn about how to make the DB2 Field Procedures Tool in IBM version 7.1 work even more efficiently as part of a more comprehensive solution, one that makes it easier to implement encryption, manage keys, and generate auditing reports so important for meeting compliance regulations like HIPAA and PCI DSS,. You can also see a demo of Linoma's popular encryption software Crypto Complete.

Learn more


All of our webinars are recorded, so if you register and are not able to attend live, you'll be able to review the webinar at a more convenient time.

We look forward to having you join us and will be happy to answer any questions you have.

 

 

Linoma's Support Team Gets Rave Reviews

 

 

For years we've received emails, phone calls, and comments at trade shows about how much our customers appreciate our support team, and we're always so glad to hear that. Our dual missions at Linoma Software is to develop (and enhance) the best possible products and to provide exceptional support for those products.

Our core support team is the first to arrive* and the last to leave each day, and between scheduled trainings, emails, online chats and phone calls, they patiently work through any questions a customer may have, and happily pass along suggestions for enhancements to our development team.

We invite you to watch this video, and if you've had a good experience with someone from our support team, please let us know. You can leave a comment below, email us, call us, or write a quick note on LinkedIn. We could even make you a video star!

We love patting our support folks on the back for a job well done, and thank you for your rave reviews.

**Ok, the developers are here early and stay late, too! Sometimes really late!

Simplify Field Encryption on IBM i

Now that corporate applications are easier to access via remote and mobile channels, it's even more important to determine which sensitive data is accessible and where possible breaches may occur. Unfortunately, legions of hackers with Wi-Fi and mobile hacking tools make it imperative that organizations prepare for and defend against potential attacks with even more pervasive security procedures.

One step in creating a stronger defense is to employ field or column-level encryption to protect sensitive data at rest.

Implementing a custom field encryption project on IBM i used to be a notoriously long and painful process. Programming code changes for field level encryption required a steep learning curve, costly programming resources, and even more time in testing, validating and updating the changed application source code. Most companies simply could not justify the additional strain on their budgets for this level of project development requirements.

In response to this challenge, IBM released its OS version 7.1 with DB2 field procedure (FieldProcs) in April of 2010 that greatly simplified the field encryption process. With the new FieldProcs technology, encryption projects can be streamlined because the field procedures are invoked at the database level, making it transparent to the applications. The FieldProcs can be coded to automatically encrypt the field on Inserts and Updates, and subsequently decrypt the field only for authorized users on Read operations. Subsequently, FieldProcs have become very important to those businesses that have legacy applications and limited budgets.

FieldProcs are a great step for improving the viability of field level encryption projects. But even with this, many companies don't have the resources to integrate and manage the FieldProcs which is why third-party software solutions, like Linoma Software's Crypto Complete, are valuable. Crypto Complete will generate and manage the FieldProcs on the fields within the files.

Crypto Complete also includes the key management, audit logs and access controls needed for PCI DSS and data privacy compliance. The value of using Crypto Complete for field encryption cannot be understated as it can greatly minimize the learning curve and reduce the implementation resource requirements from weeks to hours.

What Can We Learn from the LinkedIn Breach?

Today is another unfortunate reminder that no matter the size of a company or its industry, a data breach makes headlines.

Not only does it attract negative attention and erode customer confidence, an announcement that your company's data has or may have been compromised can result in some steep financial penalties. If fines associated with violating regulations like HIPAA or state privacy laws don't get you, potential lawsuits might.

Take LinkedIn, for example. Earlier this month, the social network of business professionals reported that nearly 6.5 million encrypted passwords had been leaked online.

Today, Mashable.com reports that LinkedIn is facing a $5 million civil lawsuit from a user claiming that LinkedIn's security policy violated industry standards for database security.

There really are no lessons for the rest of us to learn from this latest breach, because most of us already know what we're supposed to do.

  • Keep passwords secure, reasonably complex, and change them regularly.data breach
  • Ensure your company is using only the most secure encryption standards like AES or Open PGP.
  • Stay abreast of the latest news and techniques for keeping your company security policies and practices up to date and as impenetrable as possible.
  • Invest in solutions that streamline your data encryption processes, that include comprehensive auditing and reporting tools, and that ensure the security of your data at rest and in motion.

The question is how much longer can you postpone taking these steps to ensure that your company isn't making news next week with an embarrassing and costly data breach?

Wrapping Up Another Great COMMON Conference

Like many in our industry, we do our fair share of trade shows, and as anyone who has ever exhibited will tell you, it's a lot of work.

In our company, Lu Ann handles all of the arrangements. She books the plane tickets, reserves the rooms, secures the exhibition space, orders the exhibitor badges, organizes and ships the collateral, and coordinates a thousand other details to ensure everything goes smoothly for the team when they arrive.

The sales team does all of the manual labor, including packing and repacking the booth displays and equipment, helping load and unload the heavy boxes onto the shipping company's truck, and of course setting up and tearing down the booth. Again, so many details to manage to make sure everything is perfect for the opening of the show.

Months in advance, our marketing team is planning giveaways and prizes, updating collateral, and trying to add new ways to catch visitors' attention.

Throughout the show, we're working hard to connect, meeting new trade show participants and vendors, and reconnecting with long-time customers and partners. We're striking up conversations with people who pass our booth, and we're walking the floor saying hi to old friends and introducing ourselves to new ones. It's an energizing, exhausting, rewarding process.

COMMON 2012 posterAnd of all of the trade shows that we attend and/or where we exhibit, COMMON holds a special place for us. The COMMON community is tightly knit and loyal, and every show is like a family reunion. New deals are forged, partnerships are discovered, and all the while relationships are built and nurtured. When we reconnect with customers or friends, it's as if we're just picking up the conversation right where we left off from last year's COMMON conference.

As I approach my one-year anniversary as marketing manager at Linoma Software, I'm fortunate to have been invited to attended my first COMMON conference. When our president Bob Luebbe toured me around from booth to booth introducing me to people, I quickly realized the level of connection Linoma has with the IBM i community.

It was wonderful to finally meet in person all of the folks I'd been working with all year: Jennifer and Megan from iPro Developer; Chris, Kara, David and Jeff from MC Press; Tami and Darryl from IBM Systems Magazine; Dan,Timothy, Kim and Jenny with IT Jungle; and Dan Cheney, our most prolific blogger on this and the GoAnywhere Managed File Transfer blog whom I finally got to hug. It was especially amazing to spend quality time with my friend and mentor Bill Rice, with Humanized Communication.

Today, as we're breaking down the booth, saying goodbye to friends, and anticipating the long flights home, it's clear that the IBM i community is thriving. We are proud to be a part of it all, and are already planning for next spring's COMMON conference.