iSecurity Suite Products

Complete Cyber, Security & Auditing Products for IBM i Servers

Raz-Lee Security is recognized as an industry leader in IBM i security and productivity tools. Our iSecurity suite includes over 15 individual products, securing companies’ IBM i servers, as well as their business-critical databases. It supports capabilities such as user monitoring and control, sophisticated reporting and application data tracking – thereby streamlining server security audits.

Also, since developer time is the most precious resource of any IT department or software house, Raz-Lee has developed a line of products for developers to maximize productivity for their success and growth.


Real-time security events, via triggers to Email, SMS, Syslog, SNMP, and CL command.


Detects and prevents attacks by WannaCry, Petya and other similar malware.


IFS virus checks and scans, Native Object Integrity checks, alert by email and by Syslog.


Real time DB activity including READ. Compares values by fields, Alerts and Reports.


Analyzes and scores IBM i security definitions, suggests corrections and solutions.


Report generator and scheduler. Monitor QAUDJRN, Reports and Security status.

Authority Inspector

Works with IBM’s Authority Collection data. It reads, summarizes and analyzes users.

Authority on Demand

Provides temporary extended authorization by Swap or by Adding authority. 


Silent 5250 screen capture for end-to-end audit trails with Playback.

Change Tracker

Changes to production automatically logged in IFS at object / source levels.


Control validity of System and User commands and their parameters, per user, IP, time, etc.

Compliance Evaluator

Single view for Network-wide PCI, site-defined compliance checks for multiple LPARS.

Compliance Manager

User Profiles, Native Objects and IFS, Plan, Check and Set parameters and authorities.


Standard Native access to Oracle, MSSQL/MySQL, from STRSQL, RPG, COBOL.

Field Encryption

Column-level field encryption based on IBM’s FIELDPROC, Encryption & Tokenization.


SOX enabled File editor with UNDO capability and Log record of Changes.


Network security, controlling Exit Points, Open DB’s and SSH. Rule Wizards and graphical BI.


Our Graphic User Interface for iSecurity Suite also available via Web.

Multi Factor Authentication

Multi Factor Authentication ensuring Secure Sign On for IBM i.

Multi System

Define a tool once and copy the definition across all systems.


General-purpose password management for building secure passwords.

Password Reset

Self-Assisted password support, Native, in a simple way and Web-based.

PGP Encryption

Private and Public key technology for encrypting data files end-to-end.

Safe Update

Regulates file updates in production libraries. It provides a new security layer.


Protects unattended terminal screens from unauthorized access.

SIEM & DAM Support

Easy to define and integrate with IBM QRadar, Tivoli, RSA, ArcSight, and more.

User Provisioning

Onboard new users from templates, Quick and easy for hundreds of new users.

User Replication

Copy a specific user from one machine to another in seconds.


Intuitive Graphical BI analysis of security data, supports “drill” to specific events.