Banner

31CK Encryption with DB2 Field Procedures in V7R1

= Award Winning Session | = AIX | = IBM i | = Linux

Tuesday, April 9, 2013: 8:00 AM-9:15 AM
Room 12A (Austin Convention Center)

Session Abstract:
Learn how the new DB2 Field Procedures in IBM i 7.1 can be used to provide transparent database column (field) encryption.  DB2 Field Procedures are ideal for IBM i shops that want to automate the encryption and decryption of field values without modifying their source code and without changing database types or lengths.
Learning Objectives:
1) How DB2 Field Procedures can be used to provide field-level encryption in V7R1.

2) Implementation tips and techniques for DB2 Field Procedures.

3) Performance considerations and potential gotchas.

Audience:
Anyone that is responsible for the security of sensitive data (e.g. credit card numbers, social security numbers, etc.) for compliance with HIPAA, PCI and privacy laws.




Home Annual Meeting and Exposition

Share |

Copyright © 2010 COMMON, A Users Group.
All Rights Reserved.