Application & Field Level Security Monitoring

iSecurity AP-Journal

Application & Field Level Security Monitoring

iSecurity AP-Journal is an Application Security and Business Analysis software solution for IBM i servers.

AP-Journal keeps managers closely informed of essential changes in their business-critical data and allows companies to monitor these entries and send alerts or perform actions if suspicious activity is identified.

iSecurity AP-Journal reacts to insider threats as well as external security breaches and preserves the integrity of business-critical information.

image
image

Provides timeline reporting for all changes relating to critical application data

image

Reduces unauthorized access to critical data and enables organizations to meet regulatory requirements

image

Issues real-time alerts informing managers of changes in application databases and/or unapproved access to critical data

image

Identifies suspicious activity and preserves the integrity of business-critical information

image

Enforces business rules by reacting to real-time events

Features of iSecurity AP-Journal

image

Business Analysis

Secures business-critical applications from unauthorized changes. Issues real-time messages and/or e-mail alerts when user-defined thresholds are crossed. Generates instantaneous filtered reports covering changes in application data from all relevant applications, over periods spanning up to numerous years.

Application Trace

Custom application traces can be set to alert when field changes are made to business-critical data. For example,, unauthorized price changes could be detected by sending an alert when the PRICE_OF_ITEM for an ITEM shipped last month changes by a specific amount.

image
image

Regulation Compliance

Enables quick viewing of field-level changes. For HIPAA compliance, AP-Journal can report on what changes to a PATIENTS file was made using the Data File Utility (DFU) application. iSecurity AP-Journal's unique technology logs database access (READ operations) directly into the journal receivers. This functionality is not provided by IBM i journaling and is an essential component of compliance.

Report Delivery

With iSecurity AP-Journal, reports may be delivered via several methods, such as Online, Print, Email. Users can also receive report output via HTML, PDF, CSV, or outfile. AP-Journal also enables users to perform further analysis over report output using its graphical user interface business intelligence feature (Visualizer BI).

image
image

Real-Time Alerts

Alerts on incidents are received in real-time on changes in business-critical data & access. Alerts can be sent as operator messages, e-mail, text message, SYSLOG; and activate the execution of CL Scripts. One common use involves sending an SMS message and e-mail to the company’s Chief Security Officer when the PRICE_OF_ITEM field increases or decreases by more than 4%.

Latest Blogs

image
IBM i
May 22, 2024
Hardware Security & Auditing Considerations for IBM i Servers
image
IBM i
May 10, 2024
Integrating IBM i Data with SIEM Solutions
image
IBM i
April 24, 2024
Using Exit Point Programming to Control IBM i Access

LET’S GET IN TOUCH

We’re happy to answer any questions about our software and what we do.

CONTACT US NOW