• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • BOSaNOVA Earns Storage Proven Cert from IBM

    December 11, 2007 Alex Woodie

    System i shops looking to boost the security of their data through the use of encryption can feel good about going with BOSaNOVA‘s Q3 encryption appliance now that the product has received the Storage Proven certification from IBM.

    Q3 is a rack-mounted appliance that BOSaNOVA introduced earlier this year to help companies protect their sensitive data. The product, which sits between the server being backed up and the backup device or devices performing backups, uses dual-interlaced 3DES encryption engines that split the data into two streams that are encrypted separately using 112-bit keys.

    Obtaining Storage Proven status for Q3 is critical for ensuring that things run smoothly in IBM shops, says BOSaNOVA president Martin Pladgeman. “Achieving this validation gives customers a secure encryption product to protect their data at rest proven to be compatible with IBM’s storage solutions.”

    RELATED STORIES

    BOSaNOVA Encryption Device Supports Multiple Tape Drives

    BOSaNOVA Joins PCI Security Group

    Performance and Encryption Combined in Q3i from BOSaNOVA

    New BOSaNOVA Appliance Encrypts Tape Backups



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    DevSecOps & Peer Review – The Power of Automation

    In today’s fast-paced development environments, security can no longer be an afterthought. This session will explore how DevSecOps brings security into every phase of the DevOps lifecycle—early, consistently, and effectively.

    In this session, you’ll discover:

    • What DevSecOps is and why it matters?
    • Learn how to formalize your security concerns into a repeatable process
    • Discover the power of automation through pull requests, approval workflows, segregation of duties, peer review, and more—ensuring your data and production environments are protected without slowing down delivery.

    Whether you’re just getting started or looking to enhance your practices, this session will provide actionable insights to strengthen your security posture through automation and team alignment to bring consistency to the process.

    Watch Now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    looksoftware:  Present your core System i applications in Outlook, Google and Notes
    COMMON:  Join us at the annual 2008 conference, March 30 - April 3, in Nashville, Tennessee
    NowWhatJobs.net:  NowWhatJobs.net is the resource for job transitions after age 40

    IT Jungle Store Top Book Picks

    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket Developers' Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    iSeries Express Web Implementer's Guide: List Price, $59.00
    Getting Started with WebSphere Development Studio for iSeries: List Price, $79.95
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    WebFacing Application Design and Development Guide: List Price, $55.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    The All-Everything Machine: List Price, $29.95
    Chip Wars: List Price, $29.95

    Asia/Pacific Region Bolsters Disk Array Sales in Q3 Use SQL User-Defined Functions to Avoid Data Repetition Problems

    Leave a Reply Cancel reply

Volume 7, Number 46 -- December 11, 2007
THIS ISSUE SPONSORED BY:

MKS
LANSA
Profound Logic Software
Krengeltech
Affirmative Computer

Table of Contents

  • Putting the ‘i’ Back Into PCI
  • Above Security Takes i5/OS Log Aggregation to Heart
  • Shield’s Remote Journal-Based DR Solution Matures at V2R1
  • Pat Townsend and BalaBit Pair Up to Cover System i Logs
  • m-Power Generates Consistent Reports Across the Board
  • Agilysys to Sell J.D. Edwards Apps for Oracle
  • IBM Adds iSeries Support to WebSphere Dashboard Framework
  • Group 1 Launches E-Mail Marketing Software
  • BOSaNOVA Earns Storage Proven Cert from IBM
  • Now’s the Time to Review Business Continuity Strategy, SunGard Says

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • What You Will Find In IBM i 7.6 TR1 and IBM i 7.5 TR7
  • Three Things For IBM i Shops To Consider About DevSecOps
  • Big Blue Converges IBM i RPG And System Z COBOL Code Assistants Into “Project Bob”
  • As I See It: Retirement Challenges
  • IBM i PTF Guide, Volume 27, Number 41
  • Stacking Up Power11 Entry Server Performance To Older Iron
  • Big Blue Boosts IBM i Support In Instana, Adds Tracing
  • It Is Time To Tell Us What You Are Thinking And Doing
  • IBM i PTF Guide, Volume 27, Number 40
  • The GenAI Boom Is Only Slightly Louder Than The Dot Com Boom

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle