Contact Us
 
More Info
 

IBM i Encryption is Simplified in Crypto Complete 2.50

Linoma Software is proud to announce version 2.50 of Crypto Complete, which provides IBM i (iSeries) customers with more options and better performance for encrypting sensitive data. These encryption enhancements will help organizations easily comply with data privacy requirements including PCI DSS, HIPAA, GLBA, Sarbanes-Oxley and State privacy laws.

Crypto Complete 2.50 provides improved support for DB2 Field Procedures (available in IBM i 7.1) for automatic encryption and decryption of database field values. When a Field Procedure is used to auto-decrypt values, it can now return the masked value to those users who do not have full authority to the field. An authorized administrator can define the masking format and user authorization lists on a per field basis in Crypto Complete’s field encryption registry. With this added masking ability in DB2 Field Procedures, customers can save significant implementation time and costs by not having to make modifications to their application source code.

Backup encryption of IFS files has been greatly improved in Crypto Complete. The performance is significantly faster when encrypting and saving a large number of IFS files and directories, reducing the backup encryption window on the IBM i. Customers can choose IFS files using wildcards and include/exclude criteria within a single Crypto Complete command. One or more directories and subdirectories can be encrypted at a time. The restore/decryption of IFS files is likewise faster and simplified, allowing the selection of individual files and directories from backup media.

Additional enhancements in Crypto Complete version 2.50 include:

  • The ability to limit users with all-object (*ALLOBJ) special authority. Instead of solely relying on IBM’s authority checks for an *ALLOBJ user, Crypto Complete can determine their field-level authorization using individual user and group permission checks.
  • Enhanced support for program adopted authority by allowing the customer to choose if permissions should be cached for authorization lists which are linked to the field.
  • Option to allow the customer to specify the fill value to return when a user is not authorized to the full or masked value for a field. For instance, a social security number could be shown as 999-99-9999 or 000-00-0000 if the user is not authorized to the field.
  • Better support for the double byte character set, which allows customers in Japan, China, Korea and other Asian countries to automatically encrypt field-level data.

“Crypto Complete can encrypt user data wherever it is stored on the IBM i, including database fields, backups and files on the Integrated File System (IFS).” states Bob Luebbe, Chief Architect for Linoma Software. “With its integrated key management, security controls and audit logs, Crypto Complete simplifies encryption and offers a broad set of features for an affordable value.”

Crypto Complete is used by IBM i customers around the world including corporations, non-profit organizations and government entities. Download your Free Trial today!

1.800.949.4696  |  sales@linomasoftware.com  |  privacy policy
Copyright ©1994 - 2012 Linoma Software  |  All rights reserved