iSecurity is a leading solution for Power i, iSeries and AS/400 Security Learn More about iSecurity
 iSecurity Overview
 Market Need
 iSecurity Products A-Z
 Prevention Pack
 Compliance Pack
 Application Security Suite
 iSecurity GUI
 Scope Products
 iBi Visualizer
 Change Tracker
 DB Gate


Advanced IBM i Security and Server Application Monitoring

Raz-Lee's iSecurity software suite is a comprehensive, user-friendly security solution for IBM i (AS/400) environments. iSecurity products address insider threats, cyber attacks and external security risks, and the need to monitor business-critical application data.

iSecurity is a must-have component for securing IBM i, since the IBM i's integrated security is insufficient - it only includes a security infrastructure, leaving it to professional security solutions such as iSecurity to turn this infrastructure into a manageable and beneficial tool for managers and auditors. For example: IBM's exit point architecture exists, but companies lack the resources to utilize it without a solution like iSecurity Firewall; QAUDJRN log information may be all there but its esoteric codes are unreadable without a solution such as Audit.

iSecurity includes over 15 individual products, securing companies' IBM i infrastructure, as well as their business-critical databases. It supports capabilities such as user monitoring and control, sophisticated reporting and application data tracking – thereby streamlining server security audits.

Another important facility of iSecurity is enabling enterprises to comply with the requirements of the Sarbanes-Oxley, PCI and HIPAA security regulations, as well as COBIT implementation guidelines.

Continually updated to support new IBM releases and developments, iSecurity implements protective measures in line with the latest IBM i-specific technology.

iSecurity utilizes an intuitive Windows-based Graphical User Interface (GUI) as well as an equivalent green-screen interface.

iSecurity Features

  • End-to-end solution for achieving compliance and preventing security breaches
  • Modular design of stand-alone solutions that integrate into custom packs
  • Advanced network access and auditing solutions
  • Highly flexible and easily scalable
  • Built-in reports, report generator and scheduler
  • "Best-Fit" algorithm for effective corrective actions
  • Choice of user-friendly GUI or green-screen interface
  • Multi-format reports (e-mail, PDF, HTML, CSV)
  • Compliance with security regulations including Sarbanes-Oxley, PCI and HIPAA

Learn about iSecurity products:

AP-Journal Business Analysis
AP-Journal Regulation Compliance
Authority on Demand
Central Administration
Compliance Evaluator
System Control
Visualizer for Audit
Visualizer for Firewall
  iSecurity Presentation

  iSecurity Data Sheet

  iSecurity Case Study

  Demo - PCI Compliance with Compliance Evaluator

   Quick Links
Download FREE Trial

Raz-Lee on YouTube

Raz-Lee on Twitter

Copyright © 2009 Raz-Lee Security. All rights reserved  
Terms & Conditions | Site Map