Raz-Lee’s YouTube Channel: More than 5,000 Views!

Have you recently accessed our 25 YouTube videos? With a total of more than 5,000 views, our videos are just what the Facebook-Twitter-LinkedIn-WhatsApp generation wants in order to become quickly acquainted with our security, auditing and compliance solutions.

We’ve got loads of interesting “How-To”  and “Tips and Tricks” videos which solve real day-to-day issues. Most of our videos are based upon our GUI which covers 100% of the green-screen solutions, as well as on our Visualizer Business Intelligence solution.

Visualizer is a great “slice-and-dice” tool which uses our proprietary IBM i security data warehouse to enable you to quickly analyze many millions (and tens and hundreds of millions) of system journal (QAUDJRN) records and network access events. Investigating suspicious security-related events to find the “needle-in-the-haystack” takes seconds using Visualizer!

We highly recommend you access Raz-Lee’s YouTube Channel today!

Contact marketing@razlee.com for more details.


Case Study: Mortgage Bank realizes competitive advantage using AP-Journal

Most of us have taken out a home mortgage at least once and those who have, know that it’s impossible to keep track, over the 20 or 25 year lifespan of the mortgage, of all the changes made to the mortgage!

A leading mortgage bank used Raz-Lee Security’s AP-Journal product for application auditing and security, to position themselves as unique among their competitors by periodically providing customers with a “Mortgage Timeline Report”. This report concisely lists all changes made to the customer’s mortgage since its beginning, leading customers to much better understand their mortgage life-cycle.

The mortgage bank also uses AP-Journal together with HP’s ArcSight SIEM product to provide what their auditor’s say is a “built-proof” auditing solution for all database activities taking place on their IBM i. Using this functionality, the bank was able to cancel maintenance for the IBM i component of a competitive product.

Contact marketing@razlee.com for more details.

Automatic Tracking of IBM i PTF Activity and Status

Provides Unique Ability to Refer to Items in Complex Parameters (Qualifiers, Elements…)

Raz-Lee Security announced today that its recently released Change Tracker product now supports tracking IBM i PTFs installed on the system. Change Tracker enables IBM i (AS/400) companies to automatically and comprehensively track software modifications made in production libraries, at both the source and object levels.

With the increasing awareness of industry-wide regulations such as SOX, HIPAA and PCI, auditing and traceability have become issues of major importance. Change Tracker is dedicated to automatically monitoring and logging programs, files and other types of objects at both the source and object levels. Change Tracker requires no operator intervention, relies on the actual updates performed within a library, and is a “fool-proof” solution for tracking object changes without requiring any manual intervention.

Click here to read all the details

New Command Product for Securing & Monitoring IBM i CL Commands

Provides Unique Ability to Refer to Items in Complex Parameters (Qualifiers, Elements…)

Raz-Lee Security, a leading provider of IBM i security, auditing and compliance solutions, announced today the immediate availability of Command for total control over system & user defined CL commands.

Command provides the ability to control CL commands, their parameters, origin, context (i.e. the program which initiated the CL command), the user issuing the CL command, etc., and provides easy-to-define ways to react to these situations.  Command is the only product that has the ability to refer, for analysis or change, to each part of a complex parameter separately, as well as to the parameter as a whole.

Click here to read all the details

Revolutionary Business Intelligence Capabilities in Raz-Lee’s iSecurity Visualizer

Raz-Lee Security, a leading supplier of information security solutions for IBM Power i servers (iSeries/AS/400), has enhanced its iSecurity Visualizer with revolutionary Business Intelligence capabilities which will help companies analyze and pinpoint security and management issues based upon all security and management-related queries which can be executed from the iSecurity GUI.

For the past three years, Raz-Lee has offered its customers an advanced, Eclipse-based Business Intelligence solution called Visualizer for easily analyzing network access and QAUDJRN activity in a friendly graphic user interface environment. This solution enabled users to instantaneously find the “needle in the haystack” in order to investigate potential security breaches whether originating from the network or transpiring on the IBM i itself.

With the addition of the new capabilities, Visualizer now analyzes:

• Firewall log files

• Audit log files

• AP-Journal application data

• Output of Firewall queries

• Output of Audit queries including User Profile-related queries

• Output of queries which have been run and stored on disk (Database Reports)

Of special interest, the ability to analyze User Profile based queries via Visualizer adds an essential dimension to the challenge of defining, synchronizing and managing User Profile information, especially in multiple partition environments.

In addition, Visualizer now has “Drill To” capabilities for easily defining or changing security rules based upon specific network access or QAUDJRN events, as well as for dynamically displaying a table view of BI-filtered data, enabling export to Excel, PDF, CSV and HTML files.

Raz-Lee Security sees this functional expansion of Visualizer as a major step forward in helping customers obtain real benefit from iSecurity as well as in differentiating iSecurity from ALL competitors.

“Anyone reading the professional trade press over the past year or so has undoubtedly been impressed by the ever increasing number of articles centering on the potential benefits to companies attained by using Business Intelligence technologies,” said Eli Spitz, VP Business Development, Raz-Lee Security. “Our revolutionary Visualizer BI product responds to this trend and gives our customers the cutting edge technology they deserve.”

Hospital Sainte Thérèse Selects Filescope – Case Study

Mr. Didier Brisbois
Technical manager IT of IFAC
Hôspital Sainte Thérèse

My goal was to find a tool for DB2 databases which would provide me with:

• Full and robust reporting capabilities

• An easy to learn and easy to use product

• The ability to create special-purpose ViewPoints (file-specific pre-defined scripts) which can be used by unsophisticated users

• Batch processing capabilities in order not to tie-up the user’s session

• Minimal interference with AS/400 performance

Following is the list of benefits we have achieved using FileScope/Platinum:

• Quick and Easy

• Ability to perform batch processing

• Integration of FileScope into application menus

• Speed of the software, with many more options than Query

• Ability to make mass updates

• Journaling facilities to view temporary changes to a file by any user and also to monitor deleted records. (Note: These monitoring, tracking and reporting capabilities are especially important for companies which need to be HIPAA, SOX, PCI, etc. compliant.)

• Interactively viewing and editing file contents quickly and easily

• Product uses DB2-specific concepts (such as members, logical files, etc.) which is unique among products which support ODBC

• Short learning curve for most user’s queries

About FileScope

FileScope is recognized by Power i professionals as the leading Power i product in the area of data manipulation. FileScope provides unprecedented file editing capabilities, while adhering to the highest standards of quality, reliability and performance.


• Cross-product Unicode UTF-16, UCS-2 support enables viewing SAP, JDE, MOVEX, BPCS, etc. files.

• Single e-mail contains all session changes

• Export to XML-format files

• Security, SOX and PCI support

• Full-Screen editor

• Save file-specific pre-defined scripts

• Field calculations

• Report generator

• Batch processing facility

• Multiple file management

• File scan and subset

• Special printing capabilities

• Log file changes

Written by Shari Masafy
Email Shari Masafy at

Being “Half Secure” is not Enough (just like being half-pregnant)

Here’s an actual case of where iSecurityRaz-Lee’s Power i Security solution, could have saved a European bank, LGT, a lot headaches, expenses and bad press.

On February 26th, 2008 it was reported that at least eight countries were investigating their citizens for allegedly hiding financial assets at LGT Liechtenstein, an offshore bank.

The investigations were based upon the details of the bank’s clients obtained by the German secret service from a former bank employee. Using these details, German authorities investigated and prosecuted hundreds of people listed in the stolen data. At least one of the people who were investigated committed suicide, others were imprisoned, and still others were forced to leave their job at LGT. Naturally, Germany was able to make many millions of dollars in unpaid tax revenue on these non-reported assets.

On February 8th, 2010, in a decision described as “Awesome” in Business Insider website, a German court ordered the LGT subsidiary to pay more than $10M in damages to a client for failing to inform him that his confidential details had been stolen and handed to authorities, thereby harming his chances of escaping criminal penalties for tax evasion!

The remarkable part of this story is that back in February 2008, Raz-Lee’s Swiss distributor had spoken to this bank about iSecurity and reported the following:

“This bank has iSeries systems, and we spoke with the IT Managers, staff and other managers there. Their response to our presentation of iSecurity’s auditing, security and compliance solutions was something like “We have security, we don’t think we need security, maybe in the future.”

So now, LGT encountered this terrible mess!

Let’s hope that YOUR company installs iSecurity before the worst happens…

For more information click here

Choosing the Right Security Approach: Object-level Security vs. Transaction-based Security

Before selecting a System i Security solution, you must first determine the best security approach for your needs. Some systems offer an Object-level security approach, while others have a Transaction-based approach. What does this difference really mean?

Essentially, Object-level security enables you to define a “white list” of the objects (such as files) which can be accessed by all or specific users; such an approach enables specifying the exact access type (Read, Write, Update,…) for each object as well.

Transaction-based security, however, does not have this capability. Instead, this approach uses a mechanism called Memorized Transactions. With this mechanism, certain transactions are kept in a separate area (not in the log), and analyzed to check if the a pattern or particular template can be used as a security rule, or as the structural basis for allowing or disallowing access to objects. Naturally, pattern recognition is a CPU intensive task which can negatively affect process time for each transaction.

Our flagship product, iSecurity, uses Object-level security together with an intuitive algorithm in which more specific rules are analyzed before generic ones are referenced. Using this algorithm, iSecurity requires only one successful I/O with minimal CPU to find the exact rule.

The advantages of Object-level security are:

Better Performance
Object-level security is far superior in the area of performance. With Transaction-based security, the greater the number of memorized transactions, the larger the number of comparisons needed for each incoming TCP transaction (FTP, SQL, etc.). And more applications in use means more transactions generated, more rules that need to be defined, and more transactions that need to be memorized.

Less Security Exposures
Unlike Object-based security, Transaction-based security compares transactions character by character, which means that unimportant differences between transactions may render important security rules useless.

Installation & Maintenance Issues
With Transaction-based security, the administrator needs to carefully review each transaction, determine which transactions require rules, and memorize those transaction definitions. The above procedure is time consuming and, more importantly, extremely error prone. Errors in defining the rules can easily lead to actual security breaches and serious monetary and reputation losses to your company.

Written by Eli Spitz, VP Business Development, Raz-Lee Security
Email Eli Spitz at