Raz-Lee Security is recognized as an industry leader in IBM i security and productivity tools. Our iSecurity suite includes over 20 individual products, securing companies’ IBM i servers, as well as their business-critical databases.
Also, since developer time is the most precious resource of any IT department or software house, Raz-Lee has developed a line of products for developers to maximize productivity for their success and growth.
Auditing & Response
iSecurity Auditing and Response products help companies meet their IBM i auditing requirements by providing best-in-class monitoring and reporting solutions that secure their business-critical databases. It supports capabilities such as user monitoring and control, sophisticated reporting and application data tracking – thereby streamlining server security audits.
Real-time security events, via triggers to Email, SMS, Syslog, SNMP, and CL commands.
Real-time monitoring for QAUDJRN, User Activity and more. Schedule Reports and Security status.
Silent 5250 screen capture for end-to-end audit trails with Playback.
Changes to production automatically logged in IFS at object / source levels.
User Profiles, Native Objects and IFS. Plan, Check and Set parameters and authorities.
Advanced Threat Protection
Detects and isolates the threat, and prevents it from damaging valuable data.
IFS virus checks and scans, Native Object Integrity checks, alert by email and by Syslog.
Gives to you the power to choose the Antivirus Database Provider.
Authentication & Authorization
Native Multi Factor Authentication ensuring Secure Sign On for IBM i.
Self-Assisted password support, Native, in a simple way and Web-based.
Provides temporary extended authorization by Swap or by Adding authority.
Secure Data in Rest and Data in Transit with our Encryption solutions for IBM i. Enable the maximum security for your most valuable assets and comply with all the Security Policies thanks to our encryption solutions.
Column-level field encryption based on IBM’s FIELDPROC, Encryption & Tokenization.
Private and Public key technology for encrypting data files end-to-end.
Effective Protection against any situation that could compromise security and reliability for IBM i. Native Firewall Solution to control every Exit Point, besides control for Commands and Updating Files in Software Development Environments.
Regulates update files in production libraries. It provides a new security layer.
Control validity of System and User commands and their parameters, per user, IP, time, etc.
Network security, controlling Exit Points, Open DB’s and SSH. Rule Wizards and graphical BI.
Evaluation, Reporting & Alerts
Analyzes and scores IBM i security definitions, suggests corrections and solutions.
Works with IBM’s Authority Collection data. It reads, summarizes and analyzes users.
Single view for Network-wide PCI, site-defined compliance checks for multiple LPARS.
Easy to define and integrate with IBM QRadar, Tivoli, RSA, ArcSight, and more.
Intuitive Graphical BI analysis of security data, supports “drill” to specific events.
Real-time DB activity including READ. Compares values by fields, Alerts and Reports.
Standard Native access to Oracle, MSSQL/MySQL, from STRSQL, RPG, COBOL.
SOX enabled File editor with UNDO capability and Log record of Changes.