Data-Crypt Modernization Guide
Data-Crypt is a encryption product by Barnard Software. Explore technical details, modernization strategies, and migration paths below.
Product Overview
Data-Crypt is a utility designed to encrypt datasets on z/VSE systems, using either RC4 or AES encryption algorithms.
Implementation requires some technical expertise in z/VSE security concepts and encryption.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What does Data-Crypt do?
Data-Crypt is a utility that encrypts datasets on z/VSE systems. It uses either RC4 or AES encryption algorithms to protect sensitive data at rest. This helps organizations meet compliance requirements and prevent unauthorized access to confidential information.
Is this a system, application, or tool?
Data-Crypt is a tool set designed for encrypting data. It provides commands and utilities to encrypt and decrypt datasets, making it a targeted solution for data protection rather than a broad system or application framework.
What types of organizations use this?
Organizations that handle sensitive data on z/VSE systems, particularly in industries like finance, healthcare, and government, can benefit from Data-Crypt. Any company needing to comply with data protection regulations or safeguard confidential information on their mainframe can use it.
When should we consider Data-Crypt?
A company should consider Data-Crypt when they need to protect sensitive data stored in z/VSE datasets. This is especially important when facing regulatory requirements, internal security policies, or the need to prevent unauthorized access to confidential information.
What are the alternatives to Data-Crypt?
Alternatives to Data-Crypt include other encryption utilities for z/VSE, such as FILEGARD, or general-purpose encryption tools like PGP Command Line. The key difference often lies in the level of integration with the z/VSE environment and the specific encryption algorithms supported.
Technical
For mainframe products: Does this run in an LPAR?
Data-Crypt runs on z/VSE operating systems. It is designed to encrypt datasets within the z/VSE environment, leveraging the system's resources and security features. It does not require z/OS.
What infrastructure is required?
Data-Crypt requires a functional z/VSE environment. It operates directly on z/VSE datasets and does not depend on external databases or specialized hardware beyond the standard mainframe infrastructure.
What encryption algorithms does Data-Crypt use?
Data-Crypt uses RC4 or AES encryption algorithms to protect datasets. The specific choice of algorithm and key length can be configured based on security requirements and performance considerations.
What configuration files are used?
Data-Crypt likely uses configuration files to define encryption parameters, dataset selection criteria, and user access controls. These files are typically managed through the z/VSE console or a text editor.
Business Value
What is the business value of Data-Crypt?
Data-Crypt provides business value by protecting sensitive data on z/VSE systems, reducing the risk of data breaches and ensuring compliance with regulatory requirements. This can prevent financial losses, reputational damage, and legal liabilities.
What happens if we do not use Data-Crypt?
Without Data-Crypt, organizations face a higher risk of data breaches and non-compliance with data protection regulations. This can lead to financial penalties, legal action, and damage to their reputation.
How does Data-Crypt help with compliance?
Data-Crypt helps organizations comply with data protection regulations by encrypting sensitive data at rest. This ensures that unauthorized users cannot access the data, even if they gain access to the system.
Security
What authentication methods are supported?
Data-Crypt supports authentication methods available within the z/VSE environment. This may include integration with existing security systems like RACF or ACF2, or the use of internal user accounts and passwords.
What access control model is used?
Data-Crypt likely uses an access control model based on user roles and permissions. This allows administrators to define which users can access and manage encrypted datasets, ensuring that only authorized personnel can handle sensitive data.
What encryption is used and where?
Data-Crypt uses RC4 or AES encryption to protect datasets. The encryption keys are typically stored securely within the z/VSE environment, and access to these keys is strictly controlled.
What audit/logging capabilities exist?
Data-Crypt provides audit logging capabilities to track encryption and decryption activities. These logs can be used to monitor access to sensitive data, detect potential security breaches, and ensure compliance with regulatory requirements.
Operations
How is Data-Crypt typically deployed?
Data-Crypt is typically deployed on-premise within the z/VSE environment. It is installed and configured by system administrators or security personnel with expertise in mainframe systems.
What level of technical expertise is required to implement it?
Implementing Data-Crypt requires a moderate level of technical expertise. System administrators need to understand z/VSE security concepts, encryption algorithms, and access control mechanisms.
What ongoing operational requirements exist?
Ongoing operational requirements for Data-Crypt include monitoring encryption activities, managing encryption keys, and ensuring that the system is properly configured and maintained. Regular security audits are also recommended.
What are common implementation challenges?
Common implementation challenges for Data-Crypt include ensuring compatibility with existing z/VSE systems, managing encryption keys securely, and training users on proper encryption procedures.
Ready to Start Your Migration?
Download our comprehensive migration guide for Data-Crypt or calculate your ROI.