Search
Close this search box.

Webinars

Welcome to Raz-Lee’s Webinars, where we bring you the latest insights and innovations in IBM i security. Our webinars are designed to help you stay ahead of the curve, with expert knowledge, practical solutions, and interactive sessions tailored to meet your needs.

Join Us for Our Upcoming Webinars!

We are excited to invite you to our upcoming webinars, where you can gain valuable insights into IBM i security from industry experts. Don’t miss this opportunity to enhance your knowledge and stay ahead in the ever-evolving field of cybersecurity.

Probably you already have documented security policies in place for GDPR, but these will need to be supplemented and updated for DORA.

New Product Announcement: Orchestration Tool for AIX

LIVE DEMO

On Demand Webinars

Missed one of our live webinars? No problem! Our on-demand webinars allow you to access our valuable content at your convenience. Learn from our expert sessions on IBM i security whenever and wherever it suits you.

Participate and learn how to configure the MFA Multi Factor Authentication Solution from iSecurity Suite. This Webinar is a Live Demo with one of our support experts.

Participate and learn how to get the best out of Filtering Options on iSecurity Suite. This Webinar is a Live Demo with one of our support experts.

Participate and learn how to get the best out of Reporting on iSecurity Suite. This Webinar is a Live Demo with one of our support experts.

Join Robert Engel for a Great Explanation and Demo about iSecurity Multi Factor Authentication MFA.

Compliance about DLP policies is an important issue for us,We will discuss what means DLP and how to ensure compliance about it for IBM i with the help of Raz-Lee iSecurity Audit.

What is a Zero Day Attack? How to prevent such event? Questions that we need to concern about when our most valuable information is stored on our own servers, We will talk about how to stay fully prepared for such event.

We will examine the best way to approach the Zero Trust by protecting Exit Points with the combination of enabling Multi Factor Authentication plus using Firewall Policies at IBM i with Raz-Lee iSecurity MFA & iSecurity Firewall.

Know why and about what are we protecting your IBM i from? we will speak about the combined attack techniques and ransomware types, how to stay safe thanks to software like Raz-Lee iSecurity Antivirus & Anti-Ransomware

What are the Core Principles of the Zero Trust Model? we will talk about the stages of implementing Zero Trust and how Data Encryption is the First Step with the help of Raz-Lee iSecurity Field Encryption & PGP Encryption.

We will discuss the dangers of Social engineering and its prevention including Password brute-force attacks and its prevention and the benefits of enabling Multi Factor Authentication at IBM i with Raz-Lee iSecurity MFA.