Search
Close this search box.

iSecurity MFA

Our solution works in the easiest way possible, iSecurity Multi Factor Authentication inside the IBM i, as part of the user’s initial program, prompting for MFA at sign-on. 

No need for multiple login steps — one step is enough.

MFA works with every Authenticator App available in the Market. We use ANY Token generator, such as Google Authenticator on a mobile phone or by any hardware device. Freedom is part of our Multi Factor Authentication.

iSecurity MFA is the easiest system to use on the market. It can be ready for all your company’s IBM i systems to use in less than an hour. You don’t have to rewrite or recode a single module in your software.

Key Features

One MFA authentication covers all of a person’s activity from the same IP range for a specified amount of time. You can specify whether it is requested when the access is from inside or outside that person’s pre-approved ranges of IP addresses.

Other implementations require complex systems and hardware devices to meet the requirements on Multi Factor Authentication. Here at Raz-Lee, we like to keep things simple. Our solution follows a pure IBM environment standard, and can be implemented in one hour.

One MFA is good enough for all of a Person’s activities, from the same IP, for a specified time. This includes:

  • Secure Sign ON
  • FTP Server
  • REXEC
  • FTP Client
  • ODBC
  • File Server
  • Remote PGM/CMD
  • DDM/DRDA

Based on Clients Experience

iSecurity Multi Factor Authentication

Business Vertical: Finance & Banking.

Need: Zero Trust Architecture Implementation for IBM i Focused on Exit Point and User Security.

“Securing the access with Multi Factor Autentication based on the IP of the User its a great way to manage if they need or not to use the featured based on their location, also it can be configured to block access if its on a non secure location, the flexibility for creating rules is for me the best feature, protecting by User, Work schedule, including all protocols like TCP/IP, FTP, Telnet, WSG, Passthrough, etc…”

Resources

Download Presentation

Download Datasheet

Read HTML Manual

Read Release News

Request Demo

Please fill the following Form, our Sales Representatives will contact you as soon as possible.