Product details
Do you have any problems like this?
Focus Systems will solve that problem!
Concerns about the risk of information leakage from the database
I want to strengthen database security without any hassle.
01: Column-based data encryption
It can also be applied to security during traditional backup and distribution.
02: Easily incorporate encryption
It can also be applied to security during traditional backup and distribution.
Features of Crypt for DB2
■Coordination with IBMi DB2 “Field Procedure”
IBMi 7.1 and later DB2 implements an extended function called "Field Procedure" that allows you to set triggers on a field-by-field basis.
Crypt for DB2 is a cryptographic library that works with this "field procedure" function to create cryptographic processing programs for each DB2 field.
■Easy to implement and automatically encrypt/decrypt By setting an encryption/decryption processing program to the "field procedure", it is possible to automatically encrypt/decrypt when writing or referencing a specific field via a user program, etc. This makes it easier to implement processes such as
Product Specifications
Compatible OS | IBMi Ver.7.1 to Ver.7.5 (Japanese version/English version) |
Target database DB2 | DB2 for i Ver.7.1~Ver.7.5 |
Supported encryption formats Encryption formats | AES (U.S. government recommended cipher) |
Support content
・Response to technical inquiries (weekdays 10:00-17:00)
*Excluding Saturdays, Sundays, holidays, and year-end and New Year holidays.
・Free provision of the latest version of the program *If the latest program with bug fixes or new functions is released during the trial period, it will be provided free of charge.
FAQ
I want to know the price
Please contact us separately.
I want to know how to use it
After delivery of the encryption engine, development is required to incorporate encryption and decryption processing into IBMi field procedures.
Is there a sample source?
Yes, there is. Please contact us.
How will it be displayed if some of the database items (columns) are encrypted?
In SQL, numerical information is displayed as different data. The actual numbers are encrypted and cannot be seen, so even if the information is stolen, the correct information will not be visible.
Related product
MonoCrypt AES
SDK library
・FIPS140-2 certified ・Compatible with many OS ・US government recommended encryption AES available
CRYPTO RELAY
application
・High security and high-speed encryption ・World's longest encryption key length ・Multi-platform compatible
inquiry
Achievements left behind
48 years since its establishment.
We have a proven track record because we have focused on what is important.
It has a long track record in both the public and private sectors.
Number of projects per year
500 PJ
Annual number of business partners/customers
200 companies
Maximum number of trading years
47 years
Total number of qualified persons
1,870 people