SlideShare a Scribd company logo
1 of 3
Download to read offline
When Database Auditing
Meets Business Needs
November 2013

How Application Security with Raz-Lee’s AP-Journal
Positively Impacts Your Organization
Contents
ith the huge increase in the number of mobile devices worldwide, each of which requires its own

unique address, the IPv4 internet addressing protocol has reached its limit. After this issue was first

Executive Summaryinternet addressing protocol, IPv6, was officially released.
noted, an alternate

2

Introduction

3

The Mechanics of Application Security

4

IPv6 (Internet Protocol version 6) is the latest Internet Protocol, whose major feature is the increase
Stopping Application allow for the vast increase in internet users, especially with the introduction
3
of the address size to Security Breaches with AP-Journal
of mobile devices.
Since the allocation of the last of the addresses available under the old IPv4 protocol in February
One Tool to Audit Many Applications
6

2011, the penetration of IPv6 is increasing, and by 2016 IPv6 is expected to reach more than half of

Extending DB Journal Capabilities with Containers
worldwide Internet users.

6

Analyzing Application of the changes needed to support Items chose to implement IPv6
Systems Activity by Business IPv6, IBM
7
Due to the complexity

support for IBM
A Better Query i gradually, starting with OS/400 V5R2. Only now, at V7R1, it seems that the target
7
of full implementation has been achieved.

Visualizer- Integrated Business Intelligence (BI)

8

Security software, and especially Network Security software which represents an extended version
9
of standard Firewalls, are very sensitive to the existence of IPv6 support.

Keeping in Compliance, Honoring SLAs, and Keeping Your People Honest
Extending Application Functionality without Writing Code

9

As the BYOD (Bring Your Own Device) trend is extending, the security structure must also take into
Minimizing the Impactof the device used. A user on Production Systems at home 10
consideration the type of Database Auditing working on a mobile device
should
certainly about AP-Journal
be more restricted than when working in the organization’s office on the computer
For More
12
allocated specifically to the user.

To receive the full white paper, please copy “Please send me the full AP-Journal
White Paper” into the Comments area at this link.

P

Raz-Lee Security Inc.
Website: www.razlee.com
Email: marketing@razlee.com
1

Tel: 1-888-RAZLEE-4
Fax: 1-419-781-5851
2013 © All Rights Reserved
AP-Journal White Paper
Executive Summary
Even the most sophisticated business applications contain design flaws, security holes that allow for
malicious behavior or unintended human errors, and coding mistakes that create application
security breaches, causing your organization to lose revenue, create business or regulatory
compliance violations, and erode profits.
Raz-Lee’s AP-Journal Application Security & Business Analysis Solution (APJ) positively impacts
your business by providing technology that assists in finding application-related activities leading to
security breaches in your IBM i databases and alerting key personnel when a breach occurs. APJ
builds on the IBM i Journal feature to audit, filter, and report on suspicious database activity,
providing the following benefits to increase profitability, enforce compliance, and reduce costs.
1. Auditing and archiving database activity that was generated by one or more applications.
2. Auditing database history over multiple applications.
3. Archiving significant database historical activities for longer retention periods than IBM i Journal
provides, allowing you to audit for application activity in general, and security breaches
specifically over weeks, months, and even years.
4. Providing a powerful Query function for determining how critical data has changed over time.
5. Tracking changes to critical sensitive fields such as prices, salaries, and sales discounts, and
alerting all relevant personnel when key business or compliance thresholds have been
breached.
6. Allowing users and administrators to report quickly and effortlessly on cross-system activities
related to business items (such as accounts, items, customers) with no programming required,
reducing software development costs.
7. Providing these benefits with minimal impact to your production system.
AP-Journal is unique in the marketplace in enhancing company profitability through database
auditing, providing real value to your business in the following areas.
•
•
•
•
•

Ensuring your users and applications play by the rules
Allowing you to quickly find and correct application security breaches
Detecting fraud, unauthorized modifications, and accidental data corruption
Keeping your organization in compliance
Reducing costs

To receive the full white paper, please copy “Please send me the full AP-Journal
White Paper” into the Comments area at this link.

Raz-Lee Security Inc.
Website: www.razlee.com
Email: marketing@razlee.com
2

Tel: 1-888-RAZLEE-4
Fax: 1-419-781-5851
2013 © All Rights Reserved
AP-Journal White Paper

For More about AP-Journal
For additional product information see AP-Journal on our corporate website or contact Product
Marketing at marketing@razlee.com or (US) 1-888-7295334 (RAZLEE4).

About Raz-Lee
Raz-Lee Security, headquartered in Nanuet, New York, is the leading security solution provider for
IBM i (AS/400) computers. Drawing upon its more than 30 years of expertise in the IBM i
Performance and Optimization market, the company designs, develops and markets a
comprehensive suite of advanced security software solutions - iSecurity. Raz-Lee's iSecurity product
suite is field-proven at thousands of sites, ranging from sites with more than 150 systems thru
SMBs and to single-LPAR P05 installations, in more than 35 countries worldwide.

To receive the full white paper, please copy “Please send me the full AP-Journal
White Paper” into the Comments area at this link.

Raz-Lee Security Inc.
Website: www.razlee.com
Email: marketing@razlee.com
3

Tel: 1-888-RAZLEE-4
Fax: 1-419-781-5851
2013 © All Rights Reserved

More Related Content

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Raz-Lee Security AP-Journal White Paper, Executive Summary

  • 1. When Database Auditing Meets Business Needs November 2013 How Application Security with Raz-Lee’s AP-Journal Positively Impacts Your Organization Contents ith the huge increase in the number of mobile devices worldwide, each of which requires its own unique address, the IPv4 internet addressing protocol has reached its limit. After this issue was first Executive Summaryinternet addressing protocol, IPv6, was officially released. noted, an alternate 2 Introduction 3 The Mechanics of Application Security 4 IPv6 (Internet Protocol version 6) is the latest Internet Protocol, whose major feature is the increase Stopping Application allow for the vast increase in internet users, especially with the introduction 3 of the address size to Security Breaches with AP-Journal of mobile devices. Since the allocation of the last of the addresses available under the old IPv4 protocol in February One Tool to Audit Many Applications 6 2011, the penetration of IPv6 is increasing, and by 2016 IPv6 is expected to reach more than half of Extending DB Journal Capabilities with Containers worldwide Internet users. 6 Analyzing Application of the changes needed to support Items chose to implement IPv6 Systems Activity by Business IPv6, IBM 7 Due to the complexity support for IBM A Better Query i gradually, starting with OS/400 V5R2. Only now, at V7R1, it seems that the target 7 of full implementation has been achieved. Visualizer- Integrated Business Intelligence (BI) 8 Security software, and especially Network Security software which represents an extended version 9 of standard Firewalls, are very sensitive to the existence of IPv6 support. Keeping in Compliance, Honoring SLAs, and Keeping Your People Honest Extending Application Functionality without Writing Code 9 As the BYOD (Bring Your Own Device) trend is extending, the security structure must also take into Minimizing the Impactof the device used. A user on Production Systems at home 10 consideration the type of Database Auditing working on a mobile device should certainly about AP-Journal be more restricted than when working in the organization’s office on the computer For More 12 allocated specifically to the user. To receive the full white paper, please copy “Please send me the full AP-Journal White Paper” into the Comments area at this link. P Raz-Lee Security Inc. Website: www.razlee.com Email: marketing@razlee.com 1 Tel: 1-888-RAZLEE-4 Fax: 1-419-781-5851 2013 © All Rights Reserved
  • 2. AP-Journal White Paper Executive Summary Even the most sophisticated business applications contain design flaws, security holes that allow for malicious behavior or unintended human errors, and coding mistakes that create application security breaches, causing your organization to lose revenue, create business or regulatory compliance violations, and erode profits. Raz-Lee’s AP-Journal Application Security & Business Analysis Solution (APJ) positively impacts your business by providing technology that assists in finding application-related activities leading to security breaches in your IBM i databases and alerting key personnel when a breach occurs. APJ builds on the IBM i Journal feature to audit, filter, and report on suspicious database activity, providing the following benefits to increase profitability, enforce compliance, and reduce costs. 1. Auditing and archiving database activity that was generated by one or more applications. 2. Auditing database history over multiple applications. 3. Archiving significant database historical activities for longer retention periods than IBM i Journal provides, allowing you to audit for application activity in general, and security breaches specifically over weeks, months, and even years. 4. Providing a powerful Query function for determining how critical data has changed over time. 5. Tracking changes to critical sensitive fields such as prices, salaries, and sales discounts, and alerting all relevant personnel when key business or compliance thresholds have been breached. 6. Allowing users and administrators to report quickly and effortlessly on cross-system activities related to business items (such as accounts, items, customers) with no programming required, reducing software development costs. 7. Providing these benefits with minimal impact to your production system. AP-Journal is unique in the marketplace in enhancing company profitability through database auditing, providing real value to your business in the following areas. • • • • • Ensuring your users and applications play by the rules Allowing you to quickly find and correct application security breaches Detecting fraud, unauthorized modifications, and accidental data corruption Keeping your organization in compliance Reducing costs To receive the full white paper, please copy “Please send me the full AP-Journal White Paper” into the Comments area at this link. Raz-Lee Security Inc. Website: www.razlee.com Email: marketing@razlee.com 2 Tel: 1-888-RAZLEE-4 Fax: 1-419-781-5851 2013 © All Rights Reserved
  • 3. AP-Journal White Paper For More about AP-Journal For additional product information see AP-Journal on our corporate website or contact Product Marketing at marketing@razlee.com or (US) 1-888-7295334 (RAZLEE4). About Raz-Lee Raz-Lee Security, headquartered in Nanuet, New York, is the leading security solution provider for IBM i (AS/400) computers. Drawing upon its more than 30 years of expertise in the IBM i Performance and Optimization market, the company designs, develops and markets a comprehensive suite of advanced security software solutions - iSecurity. Raz-Lee's iSecurity product suite is field-proven at thousands of sites, ranging from sites with more than 150 systems thru SMBs and to single-LPAR P05 installations, in more than 35 countries worldwide. To receive the full white paper, please copy “Please send me the full AP-Journal White Paper” into the Comments area at this link. Raz-Lee Security Inc. Website: www.razlee.com Email: marketing@razlee.com 3 Tel: 1-888-RAZLEE-4 Fax: 1-419-781-5851 2013 © All Rights Reserved