Filter by Category

SQL Field Procedures Just Got Easier in IBM i 7.1

Field Encryption on the IBM i just got easier. SQL Field Procedures are a new DB2 feature in version 7.1 that allows a user-specified "exit" program to be called whenever data is read from, inserted into, or updated in a field (column). This is somewhat similar to database column triggers; however there are two distinct advantages:

  1. Field Procedures allow data to be modified on a Read operation, which allows the exit program to automatically decrypt the field value before it is returned to the customer's application.
  2. Field Procedures provide a separate internal space to store the encrypted version of the field value. This allows organizations to encrypt numeric fields such as packed decimal, signed decimal and integer data types without having to store the encrypted values in a separate file.

While IBM provided the hooks into the database with Field Procedures, they rely on 3rd party vendors like us to provide the encryption functions and key management. We worked closely with IBM to test the new Field Procedures and provide feedback to their development team during the early release beta program for 7.1. This also allowed us sufficient time to fully integrate Field Procedures into Crypto Complete for readiness when i 7.1 ships.

We're excited about Field Procedures since it will allow customers to implement column-level encryption on the IBM i without modifying their applications. This is especially important if a customer is running a canned application and/or does not want to modify their source code.

Latest Posts


Which is Better? - AS2 vs. AS4

August 16, 2019

AS2 vs. AS4 AS2 and AS4 are both popular file transfer protocols that allow businesses to exchange data securely with their business partners. However, what is the difference between them, and…


Why You Should Migrate from Your Current MFT Software

August 12, 2019

Is Your MFT Solution Keeping Up with Your File Transfer Requirements? With the increasing responsibilities IT professionals must juggle, including managing a myriad of daily tasks, addressing…


GDPR: Understanding the 8 Rights of Data Subjects

August 5, 2019

Find out what these new rights mean for your organization and how you can prepare. GDPR…


Think Your Customer Data was Exposed? Follow These Steps

July 31, 2019

When a prospect or customer shares personal data with a business, they expect their information will be stored securely, kept safe from vulnerabilities, and used only for the purposes with which it…


Is FTP Dead?

July 29, 2019

Is FTP still a viable option for sending file transfers? While organizations across all industries have started shifting to secure FTP protocols like SFTP and FTPS, a surprising number of businesses…