SlideShare a Scribd company logo
1 of 3
Download to read offline
When Database Auditing
Meets Business Needs
November 2013

How Application Security with Raz-Lee’s AP-Journal
Positively Impacts Your Organization
Contents
ith the huge increase in the number of mobile devices worldwide, each of which requires its own

unique address, the IPv4 internet addressing protocol has reached its limit. After this issue was first

Executive Summaryinternet addressing protocol, IPv6, was officially released.
noted, an alternate

2

Introduction

3

The Mechanics of Application Security

4

IPv6 (Internet Protocol version 6) is the latest Internet Protocol, whose major feature is the increase
Stopping Application allow for the vast increase in internet users, especially with the introduction
3
of the address size to Security Breaches with AP-Journal
of mobile devices.
Since the allocation of the last of the addresses available under the old IPv4 protocol in February
One Tool to Audit Many Applications
6

2011, the penetration of IPv6 is increasing, and by 2016 IPv6 is expected to reach more than half of

Extending DB Journal Capabilities with Containers
worldwide Internet users.

6

Analyzing Application of the changes needed to support Items chose to implement IPv6
Systems Activity by Business IPv6, IBM
7
Due to the complexity

support for IBM
A Better Query i gradually, starting with OS/400 V5R2. Only now, at V7R1, it seems that the target
7
of full implementation has been achieved.

Visualizer- Integrated Business Intelligence (BI)

8

Security software, and especially Network Security software which represents an extended version
9
of standard Firewalls, are very sensitive to the existence of IPv6 support.

Keeping in Compliance, Honoring SLAs, and Keeping Your People Honest
Extending Application Functionality without Writing Code

9

As the BYOD (Bring Your Own Device) trend is extending, the security structure must also take into
Minimizing the Impactof the device used. A user on Production Systems at home 10
consideration the type of Database Auditing working on a mobile device
should
certainly about AP-Journal
be more restricted than when working in the organization’s office on the computer
For More
12
allocated specifically to the user.

To receive the full white paper, please copy “Please send me the full AP-Journal
White Paper” into the Comments area at this link.

P

Raz-Lee Security Inc.
Website: www.razlee.com
Email: marketing@razlee.com
1

Tel: 1-888-RAZLEE-4
Fax: 1-419-781-5851
2013 © All Rights Reserved
AP-Journal White Paper
Executive Summary
Even the most sophisticated business applications contain design flaws, security holes that allow for
malicious behavior or unintended human errors, and coding mistakes that create application
security breaches, causing your organization to lose revenue, create business or regulatory
compliance violations, and erode profits.
Raz-Lee’s AP-Journal Application Security & Business Analysis Solution (APJ) positively impacts
your business by providing technology that assists in finding application-related activities leading to
security breaches in your IBM i databases and alerting key personnel when a breach occurs. APJ
builds on the IBM i Journal feature to audit, filter, and report on suspicious database activity,
providing the following benefits to increase profitability, enforce compliance, and reduce costs.
1. Auditing and archiving database activity that was generated by one or more applications.
2. Auditing database history over multiple applications.
3. Archiving significant database historical activities for longer retention periods than IBM i Journal
provides, allowing you to audit for application activity in general, and security breaches
specifically over weeks, months, and even years.
4. Providing a powerful Query function for determining how critical data has changed over time.
5. Tracking changes to critical sensitive fields such as prices, salaries, and sales discounts, and
alerting all relevant personnel when key business or compliance thresholds have been
breached.
6. Allowing users and administrators to report quickly and effortlessly on cross-system activities
related to business items (such as accounts, items, customers) with no programming required,
reducing software development costs.
7. Providing these benefits with minimal impact to your production system.
AP-Journal is unique in the marketplace in enhancing company profitability through database
auditing, providing real value to your business in the following areas.
•
•
•
•
•

Ensuring your users and applications play by the rules
Allowing you to quickly find and correct application security breaches
Detecting fraud, unauthorized modifications, and accidental data corruption
Keeping your organization in compliance
Reducing costs

To receive the full white paper, please copy “Please send me the full AP-Journal
White Paper” into the Comments area at this link.

Raz-Lee Security Inc.
Website: www.razlee.com
Email: marketing@razlee.com
2

Tel: 1-888-RAZLEE-4
Fax: 1-419-781-5851
2013 © All Rights Reserved
AP-Journal White Paper

For More about AP-Journal
For additional product information see AP-Journal on our corporate website or contact Product
Marketing at marketing@razlee.com or (US) 1-888-7295334 (RAZLEE4).

About Raz-Lee
Raz-Lee Security, headquartered in Nanuet, New York, is the leading security solution provider for
IBM i (AS/400) computers. Drawing upon its more than 30 years of expertise in the IBM i
Performance and Optimization market, the company designs, develops and markets a
comprehensive suite of advanced security software solutions - iSecurity. Raz-Lee's iSecurity product
suite is field-proven at thousands of sites, ranging from sites with more than 150 systems thru
SMBs and to single-LPAR P05 installations, in more than 35 countries worldwide.

To receive the full white paper, please copy “Please send me the full AP-Journal
White Paper” into the Comments area at this link.

Raz-Lee Security Inc.
Website: www.razlee.com
Email: marketing@razlee.com
3

Tel: 1-888-RAZLEE-4
Fax: 1-419-781-5851
2013 © All Rights Reserved

More Related Content

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Raz-Lee Security AP-Journal White Paper, Executive Summary

  • 1. When Database Auditing Meets Business Needs November 2013 How Application Security with Raz-Lee’s AP-Journal Positively Impacts Your Organization Contents ith the huge increase in the number of mobile devices worldwide, each of which requires its own unique address, the IPv4 internet addressing protocol has reached its limit. After this issue was first Executive Summaryinternet addressing protocol, IPv6, was officially released. noted, an alternate 2 Introduction 3 The Mechanics of Application Security 4 IPv6 (Internet Protocol version 6) is the latest Internet Protocol, whose major feature is the increase Stopping Application allow for the vast increase in internet users, especially with the introduction 3 of the address size to Security Breaches with AP-Journal of mobile devices. Since the allocation of the last of the addresses available under the old IPv4 protocol in February One Tool to Audit Many Applications 6 2011, the penetration of IPv6 is increasing, and by 2016 IPv6 is expected to reach more than half of Extending DB Journal Capabilities with Containers worldwide Internet users. 6 Analyzing Application of the changes needed to support Items chose to implement IPv6 Systems Activity by Business IPv6, IBM 7 Due to the complexity support for IBM A Better Query i gradually, starting with OS/400 V5R2. Only now, at V7R1, it seems that the target 7 of full implementation has been achieved. Visualizer- Integrated Business Intelligence (BI) 8 Security software, and especially Network Security software which represents an extended version 9 of standard Firewalls, are very sensitive to the existence of IPv6 support. Keeping in Compliance, Honoring SLAs, and Keeping Your People Honest Extending Application Functionality without Writing Code 9 As the BYOD (Bring Your Own Device) trend is extending, the security structure must also take into Minimizing the Impactof the device used. A user on Production Systems at home 10 consideration the type of Database Auditing working on a mobile device should certainly about AP-Journal be more restricted than when working in the organization’s office on the computer For More 12 allocated specifically to the user. To receive the full white paper, please copy “Please send me the full AP-Journal White Paper” into the Comments area at this link. P Raz-Lee Security Inc. Website: www.razlee.com Email: marketing@razlee.com 1 Tel: 1-888-RAZLEE-4 Fax: 1-419-781-5851 2013 © All Rights Reserved
  • 2. AP-Journal White Paper Executive Summary Even the most sophisticated business applications contain design flaws, security holes that allow for malicious behavior or unintended human errors, and coding mistakes that create application security breaches, causing your organization to lose revenue, create business or regulatory compliance violations, and erode profits. Raz-Lee’s AP-Journal Application Security & Business Analysis Solution (APJ) positively impacts your business by providing technology that assists in finding application-related activities leading to security breaches in your IBM i databases and alerting key personnel when a breach occurs. APJ builds on the IBM i Journal feature to audit, filter, and report on suspicious database activity, providing the following benefits to increase profitability, enforce compliance, and reduce costs. 1. Auditing and archiving database activity that was generated by one or more applications. 2. Auditing database history over multiple applications. 3. Archiving significant database historical activities for longer retention periods than IBM i Journal provides, allowing you to audit for application activity in general, and security breaches specifically over weeks, months, and even years. 4. Providing a powerful Query function for determining how critical data has changed over time. 5. Tracking changes to critical sensitive fields such as prices, salaries, and sales discounts, and alerting all relevant personnel when key business or compliance thresholds have been breached. 6. Allowing users and administrators to report quickly and effortlessly on cross-system activities related to business items (such as accounts, items, customers) with no programming required, reducing software development costs. 7. Providing these benefits with minimal impact to your production system. AP-Journal is unique in the marketplace in enhancing company profitability through database auditing, providing real value to your business in the following areas. • • • • • Ensuring your users and applications play by the rules Allowing you to quickly find and correct application security breaches Detecting fraud, unauthorized modifications, and accidental data corruption Keeping your organization in compliance Reducing costs To receive the full white paper, please copy “Please send me the full AP-Journal White Paper” into the Comments area at this link. Raz-Lee Security Inc. Website: www.razlee.com Email: marketing@razlee.com 2 Tel: 1-888-RAZLEE-4 Fax: 1-419-781-5851 2013 © All Rights Reserved
  • 3. AP-Journal White Paper For More about AP-Journal For additional product information see AP-Journal on our corporate website or contact Product Marketing at marketing@razlee.com or (US) 1-888-7295334 (RAZLEE4). About Raz-Lee Raz-Lee Security, headquartered in Nanuet, New York, is the leading security solution provider for IBM i (AS/400) computers. Drawing upon its more than 30 years of expertise in the IBM i Performance and Optimization market, the company designs, develops and markets a comprehensive suite of advanced security software solutions - iSecurity. Raz-Lee's iSecurity product suite is field-proven at thousands of sites, ranging from sites with more than 150 systems thru SMBs and to single-LPAR P05 installations, in more than 35 countries worldwide. To receive the full white paper, please copy “Please send me the full AP-Journal White Paper” into the Comments area at this link. Raz-Lee Security Inc. Website: www.razlee.com Email: marketing@razlee.com 3 Tel: 1-888-RAZLEE-4 Fax: 1-419-781-5851 2013 © All Rights Reserved