Product details

  • TOP
  • service
  • Cryptographic library service for IBMi - Crypt for DB2 | "DB2 for i" only

Cryptographic library service for IBMi
- Crypt for DB2 | “DB2 for i” only

Do you have any problems like this?

Focus Systems will solve that problem!

Concerns about the risk of information leakage from the database

I want to strengthen database security without any hassle.

01: Column-based data encryption

Crypt for DB2 increases the security of databases in operation by encrypting each column.
It can also be applied to security during traditional backup and distribution.

02: Easily incorporate encryption

Crypt for DB2 increases the security of databases in operation by encrypting each column.
It can also be applied to security during traditional backup and distribution.

Features of Crypt for DB2

■Coordination with IBMi DB2 “Field Procedure”
IBMi 7.1 and later DB2 implements an extended function called "Field Procedure" that allows you to set triggers on a field-by-field basis.
Crypt for DB2 is a cryptographic library that works with this "field procedure" function to create cryptographic processing programs for each DB2 field.


■Easy to implement and automatically encrypt/decrypt By setting an encryption/decryption processing program to the "field procedure", it is possible to automatically encrypt/decrypt when writing or referencing a specific field via a user program, etc. This makes it easier to implement processes such as

Product Specifications

Compatible OS

IBMi Ver.7.1 to Ver.7.5 (Japanese version/English version)

Target database DB2

DB2 for i Ver.7.1~Ver.7.5

Supported encryption formats Encryption formats

AES (U.S. government recommended cipher)

Support content

・Response to technical inquiries (weekdays 10:00-17:00)
*Excluding Saturdays, Sundays, holidays, and year-end and New Year holidays.

・Free provision of the latest version of the program *If the latest program with bug fixes or new functions is released during the trial period, it will be provided free of charge.

FAQ

I want to know the price

Please contact us separately.

I want to know how to use it

After delivery of the encryption engine, development is required to incorporate encryption and decryption processing into IBMi field procedures.

Is there a sample source?

Yes, there is. Please contact us.

How will it be displayed if some of the database items (columns) are encrypted?

In SQL, numerical information is displayed as different data. The actual numbers are encrypted and cannot be seen, so even if the information is stolen, the correct information will not be visible.

Related product

MonoCrypt AES
SDK library

・FIPS140-2 certified ・Compatible with many OS ・US government recommended encryption AES available

CRYPTO RELAY
application

・High security and high-speed encryption ・World's longest encryption key length ・Multi-platform compatible

inquiry

Achievements left behind

48 years since its establishment.
We have a proven track record because we have focused on what is important.
It has a long track record in both the public and private sectors.

Number of projects per year

500 PJ

Annual number of business partners/customers

200 companies

Maximum number of trading years

47 years

Total number of qualified persons

1,870 people