iSecurity Suite Products

Complete Cyber, Security & Auditing Products for IBM i Servers

Raz-Lee Security is recognized as an industry leader in IBM i security and productivity tools. Our iSecurity suite includes over 15 individual products, securing companies’ IBM i servers, as well as their business-critical databases. It supports capabilities such as user monitoring and control, sophisticated reporting and application data tracking – thereby streamlining server security audits.

Also, since developer time is the most precious resource of any IT department or software house, Raz-Lee has developed a line of products for developers to maximize productivity for their success and growth.

Action

Real-time security events, via triggers to Email, SMS, Syslog, SNMP, and CL command.

Anti-Ransomware

Detects and prevents attacks by WannaCry, Petya and other similar malware.

Anti-Virus

IFS virus checks and scans, Native Object Integrity checks, alert by email and by Syslog.

AP-Journal

Real time DB activity including READ. Compares values by fields, Alerts and Reports.

Assessment

Analyzes and scores IBM i security definitions, suggests corrections and solutions.

Audit

Report generator and scheduler. Monitor QAUDJRN, Reports and Security status.

Authority Inspector

Works with IBM’s Authority Collection data. It reads, summarizes and analyzes users.

Authority on Demand

Provides temporary extended authorization by Swap or by Adding authority. 

Capture

Silent 5250 screen capture for end-to-end audit trails with Playback.

Change Tracker

Changes to production automatically logged in IFS at object / source levels.

Command

Control validity of System and User commands and their parameters, per user, IP, time, etc.

Compliance Evaluator

Single view for Network-wide PCI, site-defined compliance checks for multiple LPARS.

Compliance Manager

User Profiles, Native Objects and IFS, Plan, Check and Set parameters and authorities.

DB-Gate

Standard Native access to Oracle, MSSQL/MySQL, from STRSQL, RPG, COBOL.

Field Encryption

Column-level field encryption based on IBM’s FIELDPROC, Encryption & Tokenization.

FileScope

SOX enabled File editor with UNDO capability and Log record of Changes.

Firewall

Network security, controlling Exit Points, Open DB’s and SSH. Rule Wizards and graphical BI.

GUI

Our Graphic User Interface for iSecurity Suite also available via Web.

Multi Factor Authentication

Multi Factor Authentication ensuring Secure Sign On for IBM i.

Multi System

Define a tool once and copy the definition across all systems.

Password

General-purpose password management for building secure passwords.

Password Reset

Self-Assisted password support, Native, in a simple way and Web-based.

PGP Encryption

Private and Public key technology for encrypting data files end-to-end.

Safe Update

Regulates file updates in production libraries. It provides a new security layer.

Screen

Protects unattended terminal screens from unauthorized access.

SIEM & DAM Support

Easy to define and integrate with IBM QRadar, Tivoli, RSA, ArcSight, and more.

User Provisioning

Onboard new users from templates, Quick and easy for hundreds of new users.

User Replication

Copy a specific user from one machine to another in seconds.

Visualizer

Intuitive Graphical BI analysis of security data, supports “drill” to specific events.