iSecurity Evaluation Solutions

Complete Analytics Solutions for IBM i

System weaknesses that hackers can exploit can disrupt systems and business as well as expose sensitive or personal information. It is important to evaluate your IBM i system’s internal control design and effectiveness. This includes, but is not limited to, efficiency and security protocols, IT governance, and compliance levels, to ensure the highest levels of security and auditing possible.

Raz-Lee has developed several evaluation, reporting and alert solutions for assessing security risks, analyzing data and presenting actionable information to help executives, managers and other corporate end users make informed business decisions.


Analyzes and scores IBM i security definitions, suggests corrections and solutions.

Authority Inspector

Works with IBM’s Authority Collection data. It reads, summarizes and analyzes users.

Compliance Evaluator

Single view for Network-wide PCI, site-defined compliance checks for multiple LPARS.

SIEM & DAM Support

Easy to define and integrate with IBM QRadar, Tivoli, RSA, ArcSight, and more.


Intuitive Graphical BI analysis of security data, supports “drill” to specific events.