Why Sensitive Data Intercept?
SDI protects Sensitive Data for NonStop SQL
Identify and Protect Your Sensitive Data with Seamless Interception
Sensitive Data Intercept works by intercepting NonStop database access calls, encrypting data written to disk, and decrypting data read from disk.
It supports Enscribe, SQL/MP, and SQL/MX, both native and non-native applications, sqlci, mxci, odbc/mx. No program changes are required.
With these capabilities, teams can do effective system migrations, disaster recovery, and upgrades.
Use Seamless Interception for NonStop Security and Compliance
✓ Easy to use
✓ Breakthrough speed
How it Works
An intercept library seamlessly intercepts NonStop database access calls from Guardian and OSS applications, then works with a variety of HPE, third-party, or in-house security solutions to protect sensitive data (Enscribe, SQL/MP, SQL/MX) by encrypting / tokenizing data written to disk and decrypting / detokenizing data read from disk.
SDI masks sensitive data from unauthorized parties, audits who or what is accessing sensitive data, and logs the dates and times of access.
What Is Intercept Technology?
Interception technology covers a range of techniques that can be used to alter or augment the behaviors of applications, operating systems, or other software components by intercepting function calls or system calls.
The result is the creation of new application functionality without the need to make costly, time-consuming modifications or complete recompiles.
The code that handles intercepted function calls, system calls, events, or messages is commonly called a hook. In the HPE NonStop world, a hook is known as an intercept library. It sits between an operating system and a program, a user library, or a dynamic link library.
As a process carries out a function (read/insert/update/delete), the attached intercept library captures the system call, modifies the call to handle whatever new functionality is intended, and sends the modified call to the operating system, represented here by the NonStop Kernel.
When the intercept library receives a response from the operating system, it returns the modified response to the process.
The entire operation is so seamless that at no time is the process aware that any modifications were made to its original system call.

Key Features
Seamless Interception in the NonStop Environment Extends the functionality of applications
Application Modernization – provides automatic TMF protection of nonaudited Enscribe files. Enables the conversion of Enscribe files to SQL tables.
Business Continuity – replicates Enscribe, SQL/MP, and SQL/MX DDL changes to a backup site. Replicates Enscribe unaudited files or Enscribe file modifications to a backup site.
Development, Testing, and Trace – lists program procedure calls to the NonStop Kernel. Identifies deadlocks and program sequencing errors. Monitors process stack usage to avoid abends caused by stack overflow. Adds Enscribe file-format modifications without the need to reprogram.
System Management – files accidentally purged or deleted can be recovered from a recycle bin. Scripts can be executed upon process termination. Workloads can be balanced between CPUs and disks. Low-pin resources can be optimized across all CPUs.
Virtualization and System Consolidation – allows Guardian and OSS applications to operate within any virtual time zone. Allows Guardian and OSS applications to operate with any virtual system clock or current time value.

Could your NonStop Environment Run more Smoothly?
Find out yourself with a free limited Sensitive Data Intercept license from TANDsoft.
With SDI, your teams can maximize the efficiency and continuity of your NonStop environment.
Sign up for a free trial of SDI and see how the solution can help your business boost synchronization performance and efficiency.

Get a Free Trial
We will gather needed information about your company and provide a free trial so you can decide if our products are right for you.

Use Seamless Interception for NonStop Security and Compliance
Interception technology also helps companies comply with government and industry regulations as well as enforce security policies by identifying all sensitive database access and statements, then logging the data for authorization and authentication.
Read More…
Presentations:
Contributed Articles:
Identify and Protect Your Sensitive Data with Seamless Interception
TandemWorld – What Halloween Costume Should Your Data Wear? A Data Mask by TANDsoft
HPE and TANDsoft – Working together and Accelerating results with Sensitive Data Intercept
Announcements:
Product Update – Sensitive Data Intercept Announcement
comforte Purchases SQL/MP and SQL/MX Seamless Intercept Technology from TANDsoft
Software to Enhance efficiency