Raz-Lee Security AP-Journal White Paper, Executive Summary1. When Database Auditing
Meets Business Needs
November 2013
How Application Security with Raz-Lee’s AP-Journal
Positively Impacts Your Organization
Contents
ith the huge increase in the number of mobile devices worldwide, each of which requires its own
unique address, the IPv4 internet addressing protocol has reached its limit. After this issue was first
Executive Summaryinternet addressing protocol, IPv6, was officially released.
noted, an alternate
2
Introduction
3
The Mechanics of Application Security
4
IPv6 (Internet Protocol version 6) is the latest Internet Protocol, whose major feature is the increase
Stopping Application allow for the vast increase in internet users, especially with the introduction
3
of the address size to Security Breaches with AP-Journal
of mobile devices.
Since the allocation of the last of the addresses available under the old IPv4 protocol in February
One Tool to Audit Many Applications
6
2011, the penetration of IPv6 is increasing, and by 2016 IPv6 is expected to reach more than half of
Extending DB Journal Capabilities with Containers
worldwide Internet users.
6
Analyzing Application of the changes needed to support Items chose to implement IPv6
Systems Activity by Business IPv6, IBM
7
Due to the complexity
support for IBM
A Better Query i gradually, starting with OS/400 V5R2. Only now, at V7R1, it seems that the target
7
of full implementation has been achieved.
Visualizer- Integrated Business Intelligence (BI)
8
Security software, and especially Network Security software which represents an extended version
9
of standard Firewalls, are very sensitive to the existence of IPv6 support.
Keeping in Compliance, Honoring SLAs, and Keeping Your People Honest
Extending Application Functionality without Writing Code
9
As the BYOD (Bring Your Own Device) trend is extending, the security structure must also take into
Minimizing the Impactof the device used. A user on Production Systems at home 10
consideration the type of Database Auditing working on a mobile device
should
certainly about AP-Journal
be more restricted than when working in the organization’s office on the computer
For More
12
allocated specifically to the user.
To receive the full white paper, please copy “Please send me the full AP-Journal
White Paper” into the Comments area at this link.
P
Raz-Lee Security Inc.
Website: www.razlee.com
Email: marketing@razlee.com
1
Tel: 1-888-RAZLEE-4
Fax: 1-419-781-5851
2013 © All Rights Reserved
2. AP-Journal White Paper
Executive Summary
Even the most sophisticated business applications contain design flaws, security holes that allow for
malicious behavior or unintended human errors, and coding mistakes that create application
security breaches, causing your organization to lose revenue, create business or regulatory
compliance violations, and erode profits.
Raz-Lee’s AP-Journal Application Security & Business Analysis Solution (APJ) positively impacts
your business by providing technology that assists in finding application-related activities leading to
security breaches in your IBM i databases and alerting key personnel when a breach occurs. APJ
builds on the IBM i Journal feature to audit, filter, and report on suspicious database activity,
providing the following benefits to increase profitability, enforce compliance, and reduce costs.
1. Auditing and archiving database activity that was generated by one or more applications.
2. Auditing database history over multiple applications.
3. Archiving significant database historical activities for longer retention periods than IBM i Journal
provides, allowing you to audit for application activity in general, and security breaches
specifically over weeks, months, and even years.
4. Providing a powerful Query function for determining how critical data has changed over time.
5. Tracking changes to critical sensitive fields such as prices, salaries, and sales discounts, and
alerting all relevant personnel when key business or compliance thresholds have been
breached.
6. Allowing users and administrators to report quickly and effortlessly on cross-system activities
related to business items (such as accounts, items, customers) with no programming required,
reducing software development costs.
7. Providing these benefits with minimal impact to your production system.
AP-Journal is unique in the marketplace in enhancing company profitability through database
auditing, providing real value to your business in the following areas.
•
•
•
•
•
Ensuring your users and applications play by the rules
Allowing you to quickly find and correct application security breaches
Detecting fraud, unauthorized modifications, and accidental data corruption
Keeping your organization in compliance
Reducing costs
To receive the full white paper, please copy “Please send me the full AP-Journal
White Paper” into the Comments area at this link.
Raz-Lee Security Inc.
Website: www.razlee.com
Email: marketing@razlee.com
2
Tel: 1-888-RAZLEE-4
Fax: 1-419-781-5851
2013 © All Rights Reserved
3. AP-Journal White Paper
For More about AP-Journal
For additional product information see AP-Journal on our corporate website or contact Product
Marketing at marketing@razlee.com or (US) 1-888-7295334 (RAZLEE4).
About Raz-Lee
Raz-Lee Security, headquartered in Nanuet, New York, is the leading security solution provider for
IBM i (AS/400) computers. Drawing upon its more than 30 years of expertise in the IBM i
Performance and Optimization market, the company designs, develops and markets a
comprehensive suite of advanced security software solutions - iSecurity. Raz-Lee's iSecurity product
suite is field-proven at thousands of sites, ranging from sites with more than 150 systems thru
SMBs and to single-LPAR P05 installations, in more than 35 countries worldwide.
To receive the full white paper, please copy “Please send me the full AP-Journal
White Paper” into the Comments area at this link.
Raz-Lee Security Inc.
Website: www.razlee.com
Email: marketing@razlee.com
3
Tel: 1-888-RAZLEE-4
Fax: 1-419-781-5851
2013 © All Rights Reserved