Linoma Software
Encyclopedia
Linoma Software is the developer of managed file transfer
Managed File Transfer
Managed file transfer ' refers to software solutions that facilitate the secure transfer of data, in flight and at rest, from one computer to another through a network . MFT solutions are often built to support the FTP network protocol...

 and encryption solutions. Linoma Software’s customers are primarily made up of mid-sized companies, large enterprises and government entities including city, county and state government. These organizations use Linoma’s solutions to protect sensitive data and comply with data security regulations such as PCI DSS
Payment card industry
The payment card industry denotes the debit, credit, prepaid, e-purse, ATM, and POS cards and associated businesses.The term is sometimes more specifically used to refer to the Payment Card Industry Security Standards Council, a council originally formed by American Express, Discover Financial...

, HIPAA/HITECH, SOX, GLBA and state privacy laws. Linoma’s solutions run on a variety of platforms including Windows, Linux
Linux
Linux is a Unix-like computer operating system assembled under the model of free and open source software development and distribution. The defining component of any Linux system is the Linux kernel, an operating system kernel first released October 5, 1991 by Linus Torvalds...

, UNIX
Unix
Unix is a multitasking, multi-user computer operating system originally developed in 1969 by a group of AT&T employees at Bell Labs, including Ken Thompson, Dennis Ritchie, Brian Kernighan, Douglas McIlroy, and Joe Ossanna...

, IBM i (iSeries), AIX, Solaris, HP-UX
HP-UX
HP-UX is Hewlett-Packard's proprietary implementation of the Unix operating system, based on UNIX System V and first released in 1984...

 and Mac OS X
Mac OS
Mac OS is a series of graphical user interface-based operating systems developed by Apple Inc. for their Macintosh line of computer systems. The Macintosh user experience is credited with popularizing the graphical user interface...

.

History

Linoma Group, Inc. (the parent company of Linoma Software) was founded in 1994 in Lincoln, Nebraska by Robert and Christina Luebbe. Throughout most of the ‘90s, Linoma performed consulting and contract programming services for organizations primarily in the Nebraska/Iowa area.

In 1998, Linoma Software was formed to address the needs of the IBM AS/400 platform (now known as IBM i) by developing productivity tools to help IT departments and end users. These tools were sold throughout the world and helped Linoma establish itself as an innovative software company.

In 2002, Linoma released Transfer Anywhere, which was a solution for automating and managing file transfers from the AS/400. Over the next 2-3 years, Linoma added encryption capabilities to Transfer Anywhere including support for Open PGP encryption, SFTP and FTPS
FTPS
FTPS is an extension to the commonly used File Transfer Protocol that adds support for the Transport Layer Security and the Secure Sockets Layer cryptographic protocols....

. These encryption capabilities helped organizations protect sensitive data transmissions such as ACH
Automated Clearing House
Automated Clearing House is an electronic network for financial transactions in the United States. ACH processes large volumes of credit and debit transactions in batches. ACH credit transfers include direct deposit payroll and vendor payments. ACH direct debit transfers include consumer payments...

 payments, direct deposits, financial data, credit card authorizations, personally identifiable information (PII)
Personally identifiable information
Personally Identifiable Information , as used in information security, is information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual...

 and other confidential data.

Linoma expanded into other platforms when it completely redesigned Transfer Anywhere into an open OS solution with a graphical browser-based interface, renaming it GoAnywhere Director. Released in early 2008, GoAnywhere Director includes comprehensive security controls, key management
Key management
Key management is the provisions made in a cryptography system design that are related to generation, exchange, storage, safeguarding, use, vetting, and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols.Key management concerns...

, trading partner wizards and detailed audit trails
Audit trail
Audit trail is a sequence of steps supported by proof documenting the real processing of a transaction flow through an organization, a process or a system.....

 for compliance requirements. GoAnywhere Director is in the Managed File Transfer software category of products, but can also be used for ETL
Extract, transform, load
Extract, transform and load is a process in database usage and especially in data warehousing that involves:* Extracting data from outside sources* Transforming it to fit operational needs...

 needs.

In 2009, Linoma released GoAnywhere Services as collection of secure file services including an FTP Server, FTPS Server, SFTP Server and HTTPS
Https
Hypertext Transfer Protocol Secure is a combination of the Hypertext Transfer Protocol with SSL/TLS protocol to provide encrypted communication and secure identification of a network web server...

 server. GoAnywhere Gateway was then released in 2010 as an enhanced reverse proxy
Reverse proxy
In computer networks, a reverse proxy is a type of proxy server that retrieves resources on behalf of a client from one or more servers. These resources are then returned to the client as though it originated from the reverse proxy itself...

 to protect the DMZ
Demilitarized zone (computing)
In computer security, a DMZ is a physical or logical subnetwork that contains and exposes an organization's external services to a larger untrusted network, usually the Internet...

 and comply with strict compliance
Regulatory compliance
In general, compliance means conforming to a rule, such as a specification, policy, standard or law. Regulatory compliance describes the goal that corporations or public agencies aspire to in their efforts to ensure that personnel are aware of and take steps to comply with relevant laws and...

 requirements. GoAnywhere Gateway was enhanced in 2011 to provide forward proxy functions.

Linoma Software also performs encryption of data at rest on the IBM i (iSeries) platform with its Crypto Complete product. This product also includes key management, security controls and audit trails for PCI compliance.

As of 2011, Linoma Software serves more than 3,000 customers around the world.

Certifications

VMware Ready
VMware
VMware, Inc. is a company providing virtualization software founded in 1998 and based in Palo Alto, California, USA. The company was acquired by EMC Corporation in 2004, and operates as a separate software subsidiary ....

 – Implementation and load tests for the GoAnywhere products were verified and approved by VMware to receive the VMware Ready logo.

IBM Ready for Systems with Linux - The Chiphopper
Chiphopper
The IBM Systems Application Advantage for Linux, also known as the Chiphopper offering, is designed to help you in porting, testing, and supporting your existing Linux® x86 applications on other IBM Systems and middleware platforms...

 program, created by IBM, provides support to the growing community running Linux on IBM. The GoAnywhere products were tested at the IBM Labs to run on a Linux LPAR
LPAR
A logical partition, commonly called an LPAR, is a subset of computer's hardware resources, virtualized as a separate computer. In effect, a physical machine can be partitioned into multiple logical partitions, each hosting a separate operating system....

 with the following systems: IBM p
IBM Power Systems
Power Systems is the name of IBM's Power Architecture-based server line.Before the Power Systems line was announced on April 2, 2008, IBM had two distinct Power-based lines: the System i running IBM i - and the System p series running AIX or Linux.- History :IBM had two discrete Power Architecture...

 (Power Systems), IBM i (iSeries), and IBM z (Mainframe).

Works With Windows Server 2008 R2
Windows Server 2008 R2
Windows Server 2008 R2 is a server operating system produced by Microsoft. It was released to manufacturing on July 22, 2009 and launched on October 22, 2009. According to the Windows Server Team blog, the retail availability was September 14, 2009. It is built on Windows NT 6.1, the same core...

 – GoAnywhere passed the Windows Server 2008 R2 and SQL
SQL
SQL is a programming language designed for managing data in relational database management systems ....

 Server 2008 Platform Tests for ISV
Independent software vendor
Independent software vendor is a business term for companies specializing in making or selling software, designed for mass marketing or for niche markets...

 Solutions.

IBM Ready for Power Systems Software – The GoAnywhere products were tested at the IBM Labs to run with IBM Power Systems
Power Architecture
Power Architecture is a broad term to describe similar RISC instruction sets for microprocessors developed and manufactured by such companies as IBM, Freescale, AMCC, Tundra and P.A. Semi...

 (IBM p) on either AIX, i 7.1 or Linux operating systems.

Novell Ready – The GoAnywhere products are Novell SUSE Linux Enterprise Server (SLES
SUSE Linux Enterprise Server
SUSE Linux Enterprise Server is a Linux distribution supplied by SUSE and targeted at the business market. It is targeted for servers, mainframes, and workstations but can be installed on desktop computers for testing as well. New major versions are released at an interval of 3-4 years, while...

) and Novell SUSE Linux Desktop (SLED
SUSE Linux Enterprise Desktop
SUSE Linux Enterprise Desktop , formerly introduced as Novell Linux Desktop, is a Linux distribution supplied by Novell and targeted at the business market. It is targeted for desktops. New major versions are released at an interval of 24–36 months, while minor versions are released every 9–12...

) Ready.

Associations

Microsoft Partner
Microsoft Certified Partner
A Microsoft Certified Partner is an independent company that provides Microsoft-related products or services.Microsoft Certified partners provide Microsoft services on behalf of Microsoft worldwide spanning many fields including OEM, Education, Software providers and Technical Support.Microsoft...

 – Linoma Software is a Microsoft Partner credited with the Silver Independent Software Vendor (ISV) competency. Linoma Software tests with Microsoft Server platforms and the SQL Database.

IBM Advanced Business Partner - As an Advanced Business Partner, Linoma Software is an IBM i platform beta tester and supports all its productivity, encryption, and secure file transfer solutions on IBM systems.

VMware Elite Partner - Linoma Software is an active member in the Technology Alliance Partner (TAP) program provided by VMware for ISVs.

Oracle Partner Network (OPN) - Linoma Software works with Oracle to provide the best user experience through tested and proven methods for both the Java language
Java (programming language)
Java is a programming language originally developed by James Gosling at Sun Microsystems and released in 1995 as a core component of Sun Microsystems' Java platform. The language derives much of its syntax from C and C++ but has a simpler object model and fewer low-level facilities...

 and the Solaris operating system.

PCI Security Standards - Linoma Software is a Participating Organization in the Payment Card Industry Security Standards Council (PCI SSC)

COMMON
COMMON
COMMON is the largest association of users of IBM midrange computers and IBM-compatible technology in the world.The users' group is a private, not-for-profit organization that provides education, tools, resources and networking opportunities for IBM System i users, especially those lacking...

 - Linoma Software is a member of the COMMON User Group, which is a networking community for IBM users in North America.

Better Business Bureau
Better Business Bureau
The Better Business Bureau , founded in 1912, is a corporation consisting of several private business franchises of local BBB organizations based in the United States and Canada, which work through their parent corporation, the Council of Better Business Bureaus .The Better Business Bureau, through...

 - Linoma Software is a long-time member in A+ standing with the Better Business Bureau.

Red Hat ISV Partner - Linoma Software actively participates in compatibility certification, beta testing, and performance testing for current and upcoming Red Hat Enterprise Linux (RHEL) distributions.

OpenPGP Alliance – As a member of the OpenPGP Alliance, started by Philip Zimmermann, Linoma Software supports the development and promotion of the OpenPGP standard.

Apple Developer - Linoma Software is an Apple Developer and active participant in testing and building on the Mac OS X and Mac OS X Server platforms. Linoma Software also tests the accessibility of its products on other Apple Web-based devices like the iPhone
IPhone
The iPhone is a line of Internet and multimedia-enabled smartphones marketed by Apple Inc. The first iPhone was unveiled by Steve Jobs, then CEO of Apple, on January 9, 2007, and released on June 29, 2007...

, iPad
IPad
The iPad is a line of tablet computers designed, developed and marketed by Apple Inc., primarily as a platform for audio-visual media including books, periodicals, movies, music, games, and web content. The iPad was introduced on January 27, 2010 by Apple's then-CEO Steve Jobs. Its size and...

, and iPod Touch
IPod Touch
The iPod Touch is a portable media player, personal digital assistant, handheld game console, and Wi-Fi mobile device designed and marketed by Apple Inc. The iPod Touch adds the multi-touch graphical user interface to the iPod line...

.

Novell ISV Partner - Linoma Software’s ISV partnership with Novell is strengthened through its involvement in the SUSE Studio
SUSE Studio
SUSE Studio is an online Linux image creation tool by Novell. Users can develop their own Linux OS, software appliance or virtual appliance, mainly choosing which applications and packages they want on their "custom" Linux and how it looks...

 appliance program.

GoAnywhere Director

GoAnywhere Director is a managed file transfer application that secures data exchange using secure protocols for FTP servers (FTPS
FTPS
FTPS is an extension to the commonly used File Transfer Protocol that adds support for the Transport Layer Security and the Secure Sockets Layer cryptographic protocols....

, SFTP
SSH file transfer protocol
In computing, the SSH File Transfer Protocol is a network protocol that provides file access, file transfer, and file management functionality over any reliable data stream...

, and SCP
Secure copy
Secure Copy or SCP is a means of securely transferring computer files between a local and a remote host or between two remote hosts. It is based on the Secure Shell protocol....

) and Web servers (HTTPS
Https
Hypertext Transfer Protocol Secure is a combination of the Hypertext Transfer Protocol with SSL/TLS protocol to provide encrypted communication and secure identification of a network web server...

 and AS2
AS2
AS2 is a specification about how to transport data securely and reliably over the Internet. Security is achieved by using digital certificates and encryption.- AS2 Technical Overview :The AS2 protocol is based on HTTP and S/MIME...

). The application installs on a wide variety of server platforms and provides separation of duties through role based
Role-Based Access Control
In computer systems security, role-based access control is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees, and can be implemented via mandatory access control or discretionary access control...

 access and network-based authentication options. The current version is 3.6.2.

Beyond the standard characteristics of a managed file transfer
Managed File Transfer
Managed file transfer ' refers to software solutions that facilitate the secure transfer of data, in flight and at rest, from one computer to another through a network . MFT solutions are often built to support the FTP network protocol...

 solution, GoAnywhere Director includes the following functions:
  • Data transformation
    Data transformation
    In metadata and data warehouse, a data transformation converts data from a source data format into destination data.Data transformation can be divided into two steps:...

     – translates data between file formats and database types
  • Auditing – records user, task, and file activity either internally or to a SYSLOG
    Syslog
    Syslog is a standard for computer data logging. It allows separation of the software that generates messages from the system that stores them and the software that reports and analyzes them...

     server
  • Integrated Certificate Management – maintains SSL, SSH
    Secure Shell
    Secure Shell is a network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that it connects via a secure channel over an insecure network: a server and a client...

    , and OpenPGP keys/certificates
  • Data Compression
    Data compression
    In computer science and information theory, data compression, source coding or bit-rate reduction is the process of encoding information using fewer bits than the original representation would use....

     – reduces transmission times
  • File Monitoring – automates processes based on file activity

GoAnywhere Services

GoAnywhere Services is a file server
File server
In computing, a file server is a computer attached to a network that has the primary purpose of providing a location for shared disk access, i.e. shared storage of computer files that can be accessed by the workstations that are attached to the computer network...

 that provides a secure connection for exchanging files. This is a server–only solution and does not require proprietary
Proprietary software
Proprietary software is computer software licensed under exclusive legal right of the copyright holder. The licensee is given the right to use the software under certain conditions, while restricted from other uses, such as modification, further distribution, or reverse engineering.Complementary...

 client software. It supports popular file transfer and encryption standards.

The secure browser interface in GoAnywhere Services both manages file servers as well as provides ad-hoc file transfer capability. Administrators can remotely monitor server activity and all file and user activity is audited. File activity can also trigger additional events such as copying and moving files or launching a project in the GoAnywhere Director application to further process the file. The current version is 2.5.1.

GoAnywhere Gateway

GoAnywhere Gateway provides an additional layer of network security
Network security
In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources...

 by masquerading server identities when exchanging data with trading partners. The application does not store user credentials or data in the DMZ / local network
Local area network
A local area network is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building...

. When using a reverse proxy, inbound ports do not need to be opened into the private network, which is essential for compliance
Regulatory compliance
In general, compliance means conforming to a rule, such as a specification, policy, standard or law. Regulatory compliance describes the goal that corporations or public agencies aspire to in their efforts to ensure that personnel are aware of and take steps to comply with relevant laws and...

 with PCI DSS
PCI DSS
The Payment Card Industry Data Security Standard is an information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards....

, HIPAA, HITECH, SOX, GLBA and state privacy laws. The current version is 1.1.0.

A reverse proxy is used by the application for the file-sharing services (for example, FTP/S, SFTP, HTTP/S servers) it front-ends in the DMZ. GoAnywhere Gateway’s service broker binds file transfer requests to the appropriate service in the private network through a secure control channel.

GoAnywhere Gateway makes connections to external systems on behalf of users and applications in the private network. Routing outbound requests through a centralized point helps manage file transfers through a firewall
Firewall (computing)
A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass....

. This method keeps inbound ports closed. The forward proxy hides the identities and locations of internal systems for security purposes.

Crypto Complete

Crypto Complete is a program for the IBM i that protects sensitive data using strong encryption
Encryption
In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...

, tokenization
Tokenization (data security)
Tokenization is the process of replacing some piece of sensitive data with a value that is not considered sensitive in the context of the environment that consumes the token and the original sensitive data...

, integrated key management
Key management
Key management is the provisions made in a cryptography system design that are related to generation, exchange, storage, safeguarding, use, vetting, and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols.Key management concerns...

, and auditing
Computer security audit
A computer security audit is a manual or systematic measurable technical assessment of a system or application. Manual assessments include interviewing staff, performing security vulnerability scans, reviewing application and operating system access controls, and analyzing physical access to the...

. This software encrypts database fields, backups and IFS files. The application also locates sensitive information that should be encrypted. The FNDDBFLD utility is available at no cost to IBM i users. The current version is 3.00.

The key management system is integrated within the Crypto Complete policy controls, encryption functions and auditing facilities. Along with the integrated security native to the IBM i, access to key maintenance/usage activities is controlled to help meet compliance requirements.

The backup encryption component encrypts the data written to tape devices. Crypto Complete encrypts the backups of any user data in IBM i libraries, objects, and IFS files.

The field encryption registry works with IBM’s Field Procedures and remembers which fields in a database should be encrypted. This process can be automated whenever any data is added to the field. When the data is decrypted, the returned values are masked or displayed based on the authority of the user.

Tokenization is the process of replacing sensitive data with unique identification numbers (tokens) and storing the original data on a central server (typically in encrypted form). Tokenization can help thwart hackers and minimize the scope of compliance audits when it is stored in a single central location. Tokenization is used to protect sensitive data like credit card personal account numbers (PAN), bank account numbers, social security numbers
Social Security number
In the United States, a Social Security number is a nine-digit number issued to U.S. citizens, permanent residents, and temporary residents under section 205 of the Social Security Act, codified as . The number is issued to an individual by the Social Security Administration, an independent...

, driver’s license numbers and other personally identifiable information (PII)
Personally identifiable information
Personally Identifiable Information , as used in information security, is information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual...

.

Surveyor/400

A productivity suite for working with iSeries data, files, libraries, and objects. Surveyor/400 operates in a GUI front-end, but provides options for either IBM 5250
IBM 5250
IBM 5250 was originally a family of terminal devices sold with the IBM System/34 minicomputer systems. One model was the IBM 5251-11. It also connected to the later System/36, System/38 and AS/400 systems.- Historical origins :...

 or "Command Line" emulation. The current version is 3.8.

RPG Toolbox

RPG Toolbox was developed to help developers upgrade their older RPG and System/36
System/36
The IBM System/36 was a minicomputer marketed by IBM from 1983 to 2000. It was a multi-user, multi-tasking successor to the System/34. Like the System/34 and the older System/32, the System/36 was primarily programmed in the RPG II language...

 code to the new RPG IV or OS/400 standard. The program allows developers to save code "snippets" for re-use or testing. The current version is 4.05

Platforms

The GoAnywhere applications are VMware Ready
VMware
VMware, Inc. is a company providing virtualization software founded in 1998 and based in Palo Alto, California, USA. The company was acquired by EMC Corporation in 2004, and operates as a separate software subsidiary ....

 and operate in a virtualized or static environment on the following operating systems.
  • Linux
    Linux
    Linux is a Unix-like computer operating system assembled under the model of free and open source software development and distribution. The defining component of any Linux system is the Linux kernel, an operating system kernel first released October 5, 1991 by Linus Torvalds...

  • Novell SUSE Linux Enterprise Server (SLES)
    SUSE Linux Enterprise Server
    SUSE Linux Enterprise Server is a Linux distribution supplied by SUSE and targeted at the business market. It is targeted for servers, mainframes, and workstations but can be installed on desktop computers for testing as well. New major versions are released at an interval of 3-4 years, while...

  • RedHat Enterprise Linux (RHEL)
  • Unix
    Unix
    Unix is a multitasking, multi-user computer operating system originally developed in 1969 by a group of AT&T employees at Bell Labs, including Ken Thompson, Dennis Ritchie, Brian Kernighan, Douglas McIlroy, and Joe Ossanna...

  • Mac OS X
    Mac OS X
    Mac OS X is a series of Unix-based operating systems and graphical user interfaces developed, marketed, and sold by Apple Inc. Since 2002, has been included with all new Macintosh computer systems...

  • Windows
  • HP-UX
    HP-UX
    HP-UX is Hewlett-Packard's proprietary implementation of the Unix operating system, based on UNIX System V and first released in 1984...

  • Solaris
  • IBM System p (AIX)
  • IBM System i
    IBM System i
    The IBM System i is IBM's previous generation of midrange computer systems for IBM i users, and was subsequently replaced by the IBM Power Systems in April 2008....

  • IBM System z

External Reviews/Links

Sys-Con Media - GoAnywhere 3.0

Business Wire - GoAnywhere Services

Four Hundred Stuff - Crypto Complete 2.2

IBM Systems Magazine - Crypto Complete

MC Press - Surveyor/400

IT Jungle - Surveyor/400 3.7

GoAnywhere
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK