Tuesday, April 9, 2013: 8:00 AM-9:15 AM
Room 12A (Austin Convention Center)
Learn how the new DB2 Field Procedures in IBM i 7.1 can be used to provide transparent database column (field) encryption. DB2 Field Procedures are ideal for IBM i shops that want to automate the encryption and decryption of field values without modifying their source code and without changing database types or lengths.
1) How DB2 Field Procedures can be used to provide field-level encryption in V7R1.
2) Implementation tips and techniques for DB2 Field Procedures.
3) Performance considerations and potential gotchas.
Anyone that is responsible for the security of sensitive data (e.g. credit card numbers, social security numbers, etc.) for compliance with HIPAA, PCI and privacy laws.