INNOVATION announces First Encrypted Backup Utility for IBM z/OS; FDRCRYPT
Little Falls, NJ. August 19, 2005--INNOVATION, using the SHARE 2005 Users Group Conference in Boston as an opportunity to reach a target audience, announces availability of the first encryption backup utility specifically designed for the IBM z/OS environment; FDRCRYPT.
"FDRCRYPT, an optional additional cost encryption facility, enhances the full FDR suite of business data protection, non-disruptive business continuance and information life cycle solutions protecting backup data against unauthorized access. FDRCRYPT will protect backup data sent off-site (e.g. disaster recovery tape backup) insuring that it cannot be read without the proper encryption keys and can also be used to protect on-site backups if needed", explains Thomas J. Meehan, INNOVATION Data Processing Vice President of Advance Technology. "Organizations have the same responsibility to prevent unauthorized access to data on a backup leaving their physical control as they have to protect that data while it's in their possession. It's more than just common sense, Meehan said, it's the law."
There are a plethora of state and federal codes requiring the protection of sensitive (and private) information, as well as legislation in this and other countries around the world specifically meant to preserve privacy and prevent identity theft. The privacy legislation effecting different industries; such as Check 21 (Check Clearing for the 21st Century Act) requires that banks keep electronic check records confidential. GLBA (Gramm-Leach-Bliley Act) imposes criminal penalties on financial institutions for failing to preserve privacy of current or legacy client financial data. HIPAA (Health Insurance Portability and Accountability Act) requires Corporate Human Resources Departments, Hospitals and Health Providers, Banks, Insurance Companies, Credit Card Companies, e.g. anyone possessing or processing electronic patient data, maintain it as confidential. The Payment Card Industry (e.g. MasterCard, Visa, American Express, Diners Card, Discover and JCB) Data Security Standard, acknowledging compliance legislation, now requires members, merchants, merchants' service providers and processing banks to encrypt backup data to prevent its misuse if lost. 'The piece de resistance', Meehan went on, and the model for all future privacy legislation is California SB 1386/1950, i.e. The California Security Breach Information Act (SB-1386), which requires all potentially effected individuals must be notified in case of any suspected security breach."
FDRCRYPT offers users incrementally advancing levels of encryption including AES (Advanced Encryption Standard algorithm), the current US Government standard for providing extremely secure encryption of unclassified, as well as classified data up to the levels of Secret and Top Secret. All FDRCRYPT encryption algorithms make backup data unreadable. Providing pre-compression and tempering the strength of succeeding higher degrees of security, FDRCRYPT allows users a balance between resource consumption and information value.
As the key to maintaining secure encryption is key security, FDRCRYPT, offers a variety of methods to ensure key security. FDRCRYPT Key Management options include Individual Backup Keys, Random Key Generation, Key Data Base File, Decryption Validation and RACF Master Key Storage.
FDRCRYPT V5.4 L50 will enhance FDR, FDRDSF, FDRABR, FDRAPPL backup and restore as well as the FDRTCOPY/FDRTSEL backup copy utilities. General Availability is September 30, 2005. Further information is available by calling 973-890-7300, e-mailing questions to firstname.lastname@example.org or visiting our web site at http://www.innovationdp.fdr.com/products/fdrcrypt/index.cfm
About FDRCRYPT Encryption Algorithms (SUBSTITUTION, CIPHER and AES)
The fastest algorithm and the least CPU overhead (only 10-20% more than compression alone) SUBSTITUTION, though the least sophisticated encryption option, in concert with compression presents a high 'factorial' defense that is a generally appropriate means of discouraging brute force attacks.
Slightly more resource intensive than substitution, CIPHER most certainly requires unrealistic amounts of known or well chosen plain text to defeat. A sophisticated block-cipher encryption algorithms CIPHER offers backup data a very secure level of protection that is appropriate for all but the most critically sensitive (highly valuable) information that is not otherwise subject to an AES compliance requirement.
An extremely sophisticated block-cipher, AES is the US Government standard encryption algorithm supporting key lengths of 128, 192 and 256 bits. There is no record of a practical attack on AES. Resource intensive, AES protection is appropriate for only the most critically sensitive (highest value) information and for data specifically subject to an AES compliance requirement.
A variation of the US Government FIPS AES-128 standard that uses the same repetitive data transformation algorithms, AESFAST varies the number of rounds throughout the FDR backup to reduce CPU and elapse time. Employing pre-compression and cipher block chaining, AESFAST offers a level of protection that approximates the AES compliance requirement, at a significant reduction in resource consumption.
About INNOVATION Data Processing
The leading independent software vendor in the world today, providing business data protection, non-disruptive business continuance and information life cycle management solutions for IBM eServer z/OS, zLinux, UNIX on zServers, OS/390 and S/390 Linux attached enterprise storage, as well as for Windows, UNIX and Linux, SAN, NAS and LAN distributed storage.
FDRCRYPT is a service mark, trademark and/or registered trademark of Innovation Data Processing Corporation. IBM and z/OS are trademarks or registered trademarks of International Business Machines Corporation. All other service marks, trademarks or registered trademarks are the property of their respective owners.