US car parts manufacturer’s suggestion to extend Authority on Demand functionality helps others too!

A very strategic US-based everything-you-need-for-your-car parts manufacturer trialed Authority on Demand in order to temporarily provide higher authorities to executing jobs and to enforce strict auditing reporting capabilities during the period when a job ran with higher authorities.

This company was all set to purchase AOD except that the product supported, as expected, providing higher authority to interactive jobs only. However, this particular company needed to provide temporary higher authorities to submitted jobs also which was not part of the product’s features!

Raz-Lee’s developers love challenges, so this company’s expectations are now a reality which benefits many AOD customers: batch jobs can also use Authority on Demand to temporarily add higher authorities to the currently running job, just like interactive users!

Contact for more details.

Case Study: Mortgage Bank realizes competitive advantage using AP-Journal

Most of us have taken out a home mortgage at least once and those who have, know that it’s impossible to keep track, over the 20 or 25 year lifespan of the mortgage, of all the changes made to the mortgage!

A leading mortgage bank used Raz-Lee Security’s AP-Journal product for application auditing and security, to position themselves as unique among their competitors by periodically providing customers with a “Mortgage Timeline Report”. This report concisely lists all changes made to the customer’s mortgage since its beginning, leading customers to much better understand their mortgage life-cycle.

The mortgage bank also uses AP-Journal together with HP’s ArcSight SIEM product to provide what their auditor’s say is a “built-proof” auditing solution for all database activities taking place on their IBM i. Using this functionality, the bank was able to cancel maintenance for the IBM i component of a competitive product.

Contact for more details.

JELD-WEN Germany relies on iSecurity by Raz-Lee Security

Roedental, Germany 10 June 2013 – Raz-Lee Security Inc., a leading provider of IBM i security, auditing and compliance solutions, today announced that JELD-WEN Germany has purchased a number of iSecurity solutions by Raz-Lee Security.

JELD-WEN Germany is a part of the global JELD-WEN group of companies, a leading interior door manufacturer. William Stamp, responsible for security and compliance at JELD-WEN Germany, chose to work with iSecurity after checking numerous alternative solutions.

JELD-WEN began working with iSecurity in October 2012 with the use of Firewall for logging and controlling access to the central IBM i system. Firewall was installed quickly and was productive in the context of further customer demands, so the interest in the product grew over time.

In November 2012 they began implementing iSecurity Authority on Demand in order to check the specific eligibility requirements of corporate employees. They installed Change Tracker to audit and report on changes of objects in production libraries, in particular for their internal Change Gear solution in order to synchronize their internal ticketing system for application development. It was extremely relevant important to JELD-WEN that Change Tracker can record and audit 100% of the object changes made. Moreover, these changes are added to Change Gear ticket numbers. Thus, a completely auditable change management chain is ensured.

In March 2013, JELD-WEN continued with the successful implementation of the above-mentioned iSecurity modules and installed Audit and Visualizer Business Intelligence (BI) to cover additional requirements in the area of compliance reporting. In parallel, JELD-WEN’s sister company implemented the iSecurity solutions at their Sweden facility.

JELD-WEN Germany

JELD-WEN Germany is a leading supplier of interior door solutions. They have two production sites in Mittweida and Oettingen and distribution sites in Hamburg and Gütersloh where a wide range of doors and door frames are manufactured using the latest technologies and nearly 900 highly motivated employees.

Raz-Lee Security GmbH and iSecurity

Raz-Lee Security is a leading international provider of security, auditing and compliance (SOX, PCI, HIPAA, etc.) solutions for the IBM i. Raz-Lee’s customers include companies of all sizes, from SMBs to enterprises with hundreds of systems across all vertical markets and industries. Financial institutions such as banks and insurance companies are represented especially wide among the Raz-Lee customers.

For more information, please contact:
Robert Engel
Raz-Lee Security GmbH
Schulstr. 32-96472 Roedental
Phone: +49 9563 7406-31 E-mail

$200 Discount on RPG & DB2 Summit Event, Oct. 23-25 in Minneapolis!

Raz-Lee Security will be exhibiting and promoting our new and unique DB-Gate product for direct IBM i (AS/400) client-only access to non-DB2 databases at the RPG & DB2 Summit Event.

If you plan on attending this conference you can receive a $200 discount off the standard registration price by registering at , clicking Continue, and then entering RAZLEEF12 in the Promotion Code field!

Note that the discount can be used with Standard registration rates, including Standard Alumni rates (for those who have been to a Summit in the past) but cannot be combined with other discounted pricing, such as early registration or group rates.

If you are planning to go to Minneapolis, please let us know so that we can arrange to meet!


Automatic and Effortless Auditing of Program and File Changes on IBM i

Raz-Lee Security announced today the release of its latest product, Change Tracker, which enables IBM i (AS/400) companies to automatically and comprehensively trace software modifications at both the source and object levels.

With the increasing awareness and adherence to industry-wide regulations such as SOX, HIPAA, PCI, auditing and traceability – especially within production libraries – have become issues of major importance. Change Tracker is dedicated to automatically monitoring and logging object changes at both the source and object levels. Since Change Tracker relies solely on the actual updates within a library, no manual intervention is required.

Based on the QAUDJRN system journal, Change Tracker provides a robust and comprehensive solution that cannot be bypassed. Working in real-time, it can automatically record every revision and collect all information relevant to the modifications made, including object attributes, source code, changes to file structures and more!

Click here to read all the details

iSecurity Interfaces with Splunk

Raz-Lee has recently finalized a new interface between iSecurity and Splunk’s log, monitoring and reporting tool (

The Splunk interface is in addition to the real-time Syslog alert integrations already completed with other leading SIEM products, such as IBM’s Tivoli, RSA enVision, Q1Labs and GFI Solutions – as well as successful tests done with ArcSight, HPOpenView and CA UniCenter.

For more details on Raz-Lee’s SIEM partnerships, visit:

iSecurity Now Supports QSH and PASE Logging, Reporting & Alerting

OS/400’s inability to log QSHELL activity left an opening in the overall IBM i auditing process and imposed a serious security risk to an organization. This lack of functionality has become significantly more serious with the ever-increasing use of this environment in IBM i shops. In response, Raz-Lee has developed the unique ability to log QSHELL for QSH and PASE in the IBM i.

Until now, people using native OS/400 could log standard OS/400 commands, but there was no way to log QSHELL commands. Now, companies using iSecurity Audit can run commands – entered during an interactive session as well as when entered as parameters in the QSH and STRQSH commands – that are part of the QSHELL environment to delete and write to files, create directories and more.

Click here to read the full details about iSecurity’s added support for QSH and PASE Logging, Reporting & Alerting

See You at Common – Get a Glimpse of our New Compliance Evaluator

commonWe’re off to Common 2009, the annual System i conference in Nevada, USA! Participating in this System i festival is always an adventure, but this time it’s also a big milestone for us, as we’ll be debuting our hot new Compliance Evaluator. This new tool has generated a lot of media interest – check out these articles.
IBM System i Magazine

To get an idea of what Compliance Evaluator is like, close your eyes and imagine that each morning, when you reach the office, a compliance information sheet is already waiting for you. A quick glance provides you with an analysis of your System i’s compliance with industry and corporate policies such as SOX, PCI, HIPAA, etc.

Compliance Check

Manager's Compliance Check

Customized according to your very own preferences, the report provides just the info you wanted: a bottom-line figure, detailed information, etc. You can get a good look at this tool at our Booth at Common, or simply email .

And that’s not all: We invite you to attend our captivating presentation: Tracking Application Activity via the DB-Journal: the Missing Dimension of Information Systems, by Shmuel Zailer, our CEO, at 8 a.m. Monday, April 27 at Common. For more information click here

See you at Common! We’ll be thrilled to meet you at Booth 602, Grand Sierra Resort and Casino in Reno, Nevada, April 26-28.

Written by Shari Masafy, MarCom Manager, Raz-Lee Security
Email Shari Masafy at