Linoma Software
   HOME

TheInfoList



OR:

Linoma Software was a developer of secure managed file transfer and
IBM i IBM i (the ''i'' standing for ''integrated'') is an operating system developed by IBM for IBM Power Systems. It was originally released in 1988 as OS/400, as the sole operating system of the IBM AS/400 line of systems. It was renamed to i5/OS in ...
software solutions. The company was acquired by HelpSystems in June 2016; HelpSystems changed its name to Fortra in November 2022. Mid-sized companies, large enterprises and government entities use Linoma's (now Fortra's) software products to protect sensitive data and comply with data security regulations such as
PCI DSS The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard used to handle credit cards from major card brands. The standard is administered by the Payment Card Industry Security Standards Council and its use i ...
,
HIPAA The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Kennedy– Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 1 ...
/
HITECH HiTech is a chess machine built at Carnegie Mellon University under the direction of World Correspondence Chess Champion Dr. Hans J. Berliner, by Berliner, Carl Ebeling, Murray Campbell, and Gordon Goetsch. HiTech was the first computer chess s ...
,
SOX Sox most often refers to: * Boston Red Sox, an MLB team * Chicago White Sox, an MLB team * An alternate spelling of socks Sox may also refer to: Places * SOX, Sogamoso Airport's IATA airport code, an airport in Colombia Computing and technolo ...
, GLBA and state privacy laws. Linoma's software runs on a variety of platforms including
Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for serv ...
,
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which ...
,
UNIX Unix (; trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, whose development started in 1969 at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and ot ...
,
IBM i IBM i (the ''i'' standing for ''integrated'') is an operating system developed by IBM for IBM Power Systems. It was originally released in 1988 as OS/400, as the sole operating system of the IBM AS/400 line of systems. It was renamed to i5/OS in ...
,
AIX Aix or AIX may refer to: Computing * AIX, a line of IBM computer operating systems *An Alternate Index, for a Virtual Storage Access Method Key Sequenced Data Set *Athens Internet Exchange, a European Internet exchange point Places Belgium ...
,
Solaris Solaris may refer to: Arts and entertainment Literature, television and film * ''Solaris'' (novel), a 1961 science fiction novel by Stanisław Lem ** ''Solaris'' (1968 film), directed by Boris Nirenburg ** ''Solaris'' (1972 film), directed by ...
,
HP-UX HP-UX (from "Hewlett Packard Unix") is Hewlett Packard Enterprise's proprietary implementation of the Unix operating system, based on Unix System V (initially System III) and first released in 1984. Current versions support HPE Integrity Ser ...
and
Mac OS X macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac (computer), Mac computers. Within the market of ...
.


History

Linoma Group, Inc. (the parent company of Linoma Software) was founded in 1994. The company was started in
Lincoln, Nebraska Lincoln is the capital city of the U.S. state of Nebraska and the county seat of Lancaster County. The city covers with a population of 292,657 in 2021. It is the second-most populous city in Nebraska and the 73rd-largest in the United Sta ...
by Robert and Christina Luebbe. Throughout most of the 1990s, the Linoma Group performed consulting and contract programming services for organizations in the Nebraska/Iowa area. Linoma Software was formed in 1998 to address the needs of the
IBM AS/400 The IBM AS/400 (Application System/400) is a family of midrange computers from IBM announced in June 1988 and released in August 1988. It was the successor to the System/36 and System/38 platforms, and ran the OS/400 operating system. Lower-cost ...
platform (now known as
IBM i IBM i (the ''i'' standing for ''integrated'') is an operating system developed by IBM for IBM Power Systems. It was originally released in 1988 as OS/400, as the sole operating system of the IBM AS/400 line of systems. It was renamed to i5/OS in ...
) by developing productivity tools to help IT departments and end users. These tools were sold throughout the world and helped Linoma establish itself as an innovative software company. In 2002, Linoma released Transfer Anywhere, which was a solution for automating and managing file transfers from the AS/400. Over the next 2–3 years, Linoma added
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
capabilities to Transfer Anywhere including support for Open PGP encryption, SFTP and
FTPS FTPS (also known as FTP-SSL and FTP Secure) is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer Security (TLS) and, formerly, the Secure Sockets Layer (SSL, which is now prohibited by RFC75 ...
. These encryption capabilities helped organizations protect sensitive data transmissions such as
ACH Network In the United States, the ACH Network is the national automated clearing house (ACH) for electronic funds transfers established in the 1960s and 1970s. It processes financial transactions for consumers, businesses, and federal, state, and loca ...
payments,
direct deposit A direct deposit (or direct credit), in banking, is a deposit of money by a payer directly into a payee's bank account. Direct deposits are most commonly made by businesses in the payment of salaries and wages and for the payment of suppliers' acco ...
s, financial data, credit card authorizations, personally identifiable information (PII) and other confidential data. Linoma expanded into other platforms when it completely redesigned Transfer Anywhere into an open OS solution with a graphical browser-based interface, renaming it GoAnywhere Director. Released in early 2008, GoAnywhere Director included comprehensive security controls,
key management Key management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, ...
, trading partner wizards and detailed
audit trail An audit trail (also called audit log) is a security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific ...
s for compliance requirements. In 2009, Linoma released GoAnywhere Services as a collection of secure file services including an FTP Server, FTPS Server, SFTP Server and
HTTPS Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is enc ...
server. GoAnywhere Director and Services were merged in 2015 to become GoAnywhere MFT. GoAnywhere MFT merged the workflow automation capabilities (adapted from GoAnywhere Director) with secure FTP server and collaboration features (adapted from GoAnywhere Services). This provides a unified browser-based interface, centralized logging and reporting. GoAnywhere MFT is in the Managed File Transfer software category of products, but can also be used for ETL functions. GoAnywhere Gateway was released in 2010 as an enhanced
reverse proxy In computer networks, a reverse proxy is the application that sits in front of back-end applications and forwards client (e.g. browser) requests to those applications. Reverse proxies help increase scalability, performance, resilience and securi ...
to protect the
DMZ A demilitarized zone (DMZ or DZ) is an area in which treaties or agreements between nations, military powers or contending groups forbid military installations, activities, or personnel. A DZ often lies along an established frontier or bounda ...
and help organizations meet strict compliance requirements. GoAnywhere Gateway was enhanced in 2011 to provide
forward proxy In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. Instead of connecting directly to a server that can fulfill a request ...
functions. Linoma Software also performs
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
of data at rest on the IBM i platform with its Crypto Complete product. This product also includes key management, security controls and audit trails for PCI compliance. In June 2016, Minneapolis, Minnesota-based HelpSystems acquired Linoma Software. In March 2019, GoAnywhere MFT, in combination with
Clearswift Clearswift is an information security company based in the UK. It offers cyber-security services to protect business's data from internal and external threats. The company is owned by Eden Prairie, Minnesota-based HelpSystems. History Clear ...
’s ICAP and adaptive redaction product, was named a Security Solution of the Year finalist for the European IT & Software Excellence Awards 2019. In November 2022, the parent company HelpSystems changed its name to Fortra.


Certifications

* VMware Ready * Novell Ready for
SUSE Linux Enterprise Server SUSE Linux Enterprise (often abbreviated to SLE) is a Linux-based operating system developed by SUSE. It is available in two editions, suffixed with Server (SLES) for servers and mainframes, and Desktop (SLED) for workstations and desktop compu ...
* Works With
Windows Server 2008 R2 Windows Server 2008 R2 is the fifth version of the Windows Server operating system produced by Microsoft and released as part of the Windows NT family of operating systems. It was released to manufacturing on July 22, 2009, and became General av ...
* IBM Ready for Power Systems Software –
IBM Power Systems Power Systems is a family of server computers from IBM that are based on its Power processors. It was created in 2008 as a merger of the System p and System i product lines. History IBM had two distinct POWER- and PowerPC-based hardware li ...
* IBM Ready for Systems with Linux - IBM Chiphopper


Associations

* Microsoft Partner ** Silver Independent Software Vendor (ISV) competency. ** Silver Application Integration competency. * IBM Advanced Business Partner * VMware Elite Partner * Oracle Partner Network (OPN) * PCI Security Standards *
COMMON Common may refer to: Places * Common, a townland in County Tyrone, Northern Ireland * Boston Common, a central public park in Boston, Massachusetts * Cambridge Common, common land area in Cambridge, Massachusetts * Clapham Common, originally com ...
*
Better Business Bureau Better Business Bureau (BBB) is a private, 501(c)(6) nonprofit organization founded in 1912. BBB's self-described mission is to focus on advancing marketplace trust, consisting of 97 independently incorporated local BBB organizations in the Unit ...
* Red Hat ISV Partner * OpenPGP Alliance *
Apple Developer Apple Developer (formerly Apple Developer Connection) is Apple Inc.'s website for software development tools, application programming interfaces (APIs), and technical resources. It contains resources to help software developers write software for t ...
* Novell ISV Partner * GSA Advantage Schedule


Software


GoAnywhere MFT

GoAnywhere MFT is a
managed file transfer Managed file transfer (MFT) refers to a technology that provides the secure transfer of data in an efficient and reliable manner. MFT software is marketed to companies as a more secure alternative to using insecure protocols like FTP (file transfe ...
solution for the exchange of data between systems, employees, customers and trading partners. It provides a single point of control with security settings, detailed audit trails and reports. Data transfers are secured using protocols for
FTP The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data ...
servers (
FTPS FTPS (also known as FTP-SSL and FTP Secure) is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer Security (TLS) and, formerly, the Secure Sockets Layer (SSL, which is now prohibited by RFC75 ...
, SFTP, and
SCP SCP may refer to: Organizations Political parties * Soviet Communist Party, the leading political party in the former Soviet Union * Syrian Communist Party * Sudanese Communist Party * Scottish Christian Party Companies * Seattle Computer Produ ...
) and Web servers (
HTTPS Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is enc ...
and
AS2 AS2 (Applicability Statement 2) is a specification on how to transport structured business-to-business data securely and reliably over the Internet. Security is achieved by using digital certificates and encryption. Background AS2 was created ...
). It supports popular encryption protocols and offers a NIST-certified
FIPS 140-2 The Federal Information Processing Standard Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used to approve cryptographic modules. The title is ''Security Requirements for Cryptographic Modules''. Initial publ ...
Validated Encryption module. GoAnywhere MFT's interface and workflow features help to eliminate the need for custom programs/scripts, single-function tools and manual processes that were traditionally needed. This improves the quality of file transfers and helps organizations to comply with data security policies and regulations. With integrated support for clustering, GoAnywhere MFT can process high volumes of file transfers for enterprises by load balancing processes across multiple systems. The clustering technology in GoAnywhere MFT also provides active-active automatic failover for disaster recovery. A secure email module is also available that allows users to send messages and files as secure packages. Recipients receive an email with a unique link to each package that allows them to view or download the files via a secure HTTPS connection. There is no limit on file size or type, and each package can be subject to password protection as well as other security features. GoAnywhere agents are lightweight applications that automate file transfers and workflows on remote and on-premises systems throughout the enterprise. Agents are managed by a central deployment of GoAnywhere MFT, allowing users to configure and schedule agent file transfers and business processes from the browser-based interface. For integration with cloud and web applications, GoAnywhere offers Cloud Connectors, built-in integrations that help users automatically move data to and from applications like SharePoint or Salesforce. A designer interface in the software also makes it possible for users to build custom connectors.


GoDrive by GoAnywhere

GoDrive is an on-premise solution that provides Enterprise File Sync and Sharing (EFSS) services for employees and partners. GoDrive files and folders can be easily shared between users with advanced collaboration features including file revision tracking, commenting, trash bin, media viewing and synchronization with Windows and Mac devices. GoDrive is an alternative to cloud-based file sharing services. It provides on-site file storage with localized control,
end-to-end encryption End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers – including telecom providers, Internet providers, malicious actors, and even ...
, and detailed audit trails. If an end-user device is lost or stolen, its GoDrive data can be deactivated and wiped remotely.


GoAnywhere Gateway

GoAnywhere Gateway provides an additional layer of
network security Network security consists of the policies, policies, processes and practices adopted to prevent, detect and monitor unauthorized access, Abuse, misuse, modification, or denial of a computer network and network-accessible resources. Network securi ...
by masquerading server identities when exchanging data with trading partners. The application does not store user credentials or data in the
DMZ A demilitarized zone (DMZ or DZ) is an area in which treaties or agreements between nations, military powers or contending groups forbid military installations, activities, or personnel. A DZ often lies along an established frontier or bounda ...
/
local network A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building. By contrast, a wide area network (WAN) not only covers a larger ...
. When using a
reverse proxy In computer networks, a reverse proxy is the application that sits in front of back-end applications and forwards client (e.g. browser) requests to those applications. Reverse proxies help increase scalability, performance, resilience and securi ...
, inbound ports do not need to be opened into the private network, which is essential for compliance with
PCI DSS The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard used to handle credit cards from major card brands. The standard is administered by the Payment Card Industry Security Standards Council and its use i ...
,
HIPAA The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Kennedy– Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 1 ...
,
HITECH HiTech is a chess machine built at Carnegie Mellon University under the direction of World Correspondence Chess Champion Dr. Hans J. Berliner, by Berliner, Carl Ebeling, Murray Campbell, and Gordon Goetsch. HiTech was the first computer chess s ...
,
SOX Sox most often refers to: * Boston Red Sox, an MLB team * Chicago White Sox, an MLB team * An alternate spelling of socks Sox may also refer to: Places * SOX, Sogamoso Airport's IATA airport code, an airport in Colombia Computing and technolo ...
, GLBA and state privacy laws. The current version is 2.0.1. A
reverse proxy In computer networks, a reverse proxy is the application that sits in front of back-end applications and forwards client (e.g. browser) requests to those applications. Reverse proxies help increase scalability, performance, resilience and securi ...
is used by the application for the file-sharing services (for example, FTP/S, SFTP, HTTP/S servers) it front-ends in the DMZ. GoAnywhere Gateway's service broker binds file transfer requests to the appropriate service in the private network through a secure control channel. GoAnywhere Gateway makes connections to external systems on behalf of users and applications in the private network. Routing outbound requests through a centralized point helps manage file transfers through a
firewall Firewall may refer to: * Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts * Firewall (construction), a barrier inside a building, designed to limit the spre ...
. This method keeps inbound ports closed. The
forward proxy In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. Instead of connecting directly to a server that can fulfill a request ...
hides the identities and locations of internal systems for security purposes.


GoAnywhere OpenPGP Studio

GoAnywhere OpenPGP Studio is a free desktop tool that protects sensitive files using the OpenPGP encryption standard. Documents can be encrypted, decrypted, signed and verified from a PC or workstation using this tool. An integrated key manager allows users to create, import, export and manage OpenPGP keys needed to encrypt and decrypt files. GoAnywhere OpenPGP Studio will run on almost any operating system including Windows, Linux, Mac OS X, Solaris and UNIX.


Crypto Complete

Crypto Complete is a program for the IBM i that protects sensitive data using strong
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
,
tokenization Tokenization may refer to: * Tokenization (lexical analysis) in language processing * Tokenization (data security) in the field of data security * Word segmentation * Tokenism Tokenism is the practice of making only a perfunctory or symbolic ef ...
, integrated
key management Key management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, ...
, and
auditing An audit is an "independent examination of financial information of any entity, whether profit oriented or not, irrespective of its size or legal form when such an examination is conducted with a view to express an opinion thereon.” Auditing ...
. This software encrypts database fields, can automatically encrypt IFS files. The application also locates sensitive information that should be encrypted using the FNDDBFLD utility, which is available at no cost to IBM i users. The current version is 3.3.0. The key management system is integrated within the Crypto Complete policy controls, encryption functions and auditing facilities. Along with the integrated security native to the
IBM i IBM i (the ''i'' standing for ''integrated'') is an operating system developed by IBM for IBM Power Systems. It was originally released in 1988 as OS/400, as the sole operating system of the IBM AS/400 line of systems. It was renamed to i5/OS in ...
, access to key maintenance/usage activities is controlled to help meet compliance requirements. The backup encryption component encrypts the data written to tape devices. Crypto Complete encrypts the backups of any user data in IBM i libraries, objects, and IFS files. The field encryption registry works with IBM's Field Procedures and remembers which fields in a database should be encrypted. This process can be automated whenever any data is added to the field. When the data is decrypted, the returned values are masked or displayed based on the authority of the user. Tokenization is the process of replacing sensitive data with unique identification numbers (tokens) and storing the original data on a central server (typically in encrypted form). Tokenization can help thwart hackers and minimize the scope of compliance audits when it is stored in a single central location. Tokenization is used to protect sensitive data like credit card personal account numbers (PAN), bank account numbers,
social security numbers In the United States, a Social Security number (SSN) is a nine-digit number issued to U.S. citizens, permanent residents, and temporary (working) residents under section 205(c)(2) of the Social Security Act, codified as . The number is issued t ...
, driver's license numbers and other personally identifiable information (PII).


Surveyor/400

A productivity suite for working with IBM i data, files, libraries, and objects. Surveyor/400 operates in a GUI front-end, but provides options for either
IBM 5250 IBM 5250 is a family of block-oriented terminals originally introduced with the IBM System/34 midrange computer systems in 1977. It also connects to the later System/36, System/38, and IBM AS/400 systems, and to IBM Power Systems systems running I ...
or "Command Line" emulation. The current version is 4.0.4.IBM Journal - 13 December 2010
/ref>


RPG Toolbox

RPG Toolbox was developed to help developers upgrade their older RPG and
System/36 The IBM System/36 (often abbreviated as S/36) was a midrange computer marketed by IBM from 1983 to 2000 - a multi-user, multi-tasking successor to the System/34. Like the System/34 and the older System/32, the System/36 was primarily progr ...
code to the new RPG IV or OS/400 standard. The program allows developers to save code "snippets" for re-use or testing. The current version is 4.06


Platforms

The GoAnywhere applications are VMware Ready and operate in a virtualized or static environment on the following operating systems. *
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which ...
* Novell SUSE Linux Enterprise Server (SLES) *
Red Hat Enterprise Linux Red Hat Enterprise Linux (RHEL) is a commercial open-source Linux distribution developed by Red Hat for the commercial market. Red Hat Enterprise Linux is released in server versions for x86-64, Power ISA, ARM64, and IBM Z and a desktop version ...
*
Unix Unix (; trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, whose development started in 1969 at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and ot ...
*
Mac OS X macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac (computer), Mac computers. Within the market of ...
*
Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for serv ...
*
HP-UX HP-UX (from "Hewlett Packard Unix") is Hewlett Packard Enterprise's proprietary implementation of the Unix operating system, based on Unix System V (initially System III) and first released in 1984. Current versions support HPE Integrity Ser ...
*
Solaris Solaris may refer to: Arts and entertainment Literature, television and film * ''Solaris'' (novel), a 1961 science fiction novel by Stanisław Lem ** ''Solaris'' (1968 film), directed by Boris Nirenburg ** ''Solaris'' (1972 film), directed by ...
* IBM System p (AIX) *
IBM i IBM i (the ''i'' standing for ''integrated'') is an operating system developed by IBM for IBM Power Systems. It was originally released in 1988 as OS/400, as the sole operating system of the IBM AS/400 line of systems. It was renamed to i5/OS in ...
*
IBM System z IBM Z is a family name used by IBM for all of its z/Architecture mainframe computers. In July 2017, with another generation of products, the official family was changed to IBM Z from IBM z Systems; the IBM Z family now includes the newest mode ...
*
Amazon EC2 Amazon Elastic Compute Cloud (EC2) is a part of Amazon.com's cloud-computing platform, Amazon Web Services (AWS), that allows users to rent virtual computers on which to run their own computer applications. EC2 encourages scalable deployment of ...
*
Microsoft Azure Microsoft Azure, often referred to as Azure ( , ), is a cloud computing platform operated by Microsoft for application management via around the world-distributed data centers. Microsoft Azure has multiple capabilities such as software as a ...


See also

*
Comparison of FTP server software Comparison or comparing is the act of evaluating two or more things by determining the relevant, comparable characteristics of each thing, and then determining which characteristics of each are similar to the other, which are different, and t ...


Notes

{{Reflist, 30em


External Reviews/Links

Business Wire - GoAnywhere Services
br /

br /> Secure communication Managed file transfer