iSecurity Logo White 2


a new dimension in securing production files

Safe Update

IBM i Security Solutions

Security Investigator Suite

Authority Inspector hipaa compliance

iSecurity Security Investigator delivers a comprehensive view of the vulnerabilities within an organization. It is comprised of Data Discovery, Authority Inspector and Assessment.

Compliance Evaluator


iSecurity Compliance Evaluator gives chiefs, examiners and system admins a fast, network-wide, Complete summary of their IBM i server’s compliance level with regulations.

About iSecurity

ibm i security solutions

Raz-Lee’s leading iSecurity suite for IBM i (AS/400) helps companies protect valuable information assets against insider threats, cyber attacks and unauthorized external access.

iSecurity For Your IBM i


Firewall ransomware on ibm i

iSecurity Firewall for IBM i is a comprehensive, all-inclusive intrusion prevention system that secures every type of internal and external access to the IBM i server. It enables easy detection of remote network accesses and real-time alerts. 

Field Encryption

Field Encryption for IBM i

iSecurity Field Encryption for IBM i protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting compliance with PCI DSS, GDPR, HIPAA, SOX, and other regulations.


Audit compliance with gdpr

iSecurity Audit for IBM i enhances native AS/400 auditing by monitoring and reporting on all activities in the IBM i environment. It employs real-time detection to identify security events as they occur and record details in a log file. 


AP Journal hipaa compliance

iSecurity AP-Journal for IBM i protects business-critical information from insider threats and from external security breaches, notifies managers of any changes to information assets and streamlines IBM i journaling procedures. 

iSecurity products overview

Learn how Raz-Lee security achieves an outstanding level of expertise and development capacities. The company’s wide-ranging customer base includes large companies in all vertical markets, in over 30 countries worldwide.

iSecurity Logo ibm i server application security
Play Video