Raz-Lee's flagship iSecurity suite protects organizations against insider and outside threats, preventing unauthorized access to business-critical information. Raz-Lee is committed to providing comprehensive IBM i compliance, auditing and security solutions.
Solutions by Raz-Lee Security
Your IBM i is facing these threats right now.
Get yourself secured.
- Stop ransomware attacks as they start
- Both known and zero-day ransomware
- Alert by email, send message to SIEM
- New attack simulator
- Installed on IBM i
iSecurity Antivirus software cannot be disabled by any known virus, runs Locally at the IBM i or it can be executed on ICAP Client Mode releasing all the processing load to specific and trusted servers and gives to you the power to choose the Antivirus Database Provider.
iSecurity Firewall is a comprehensive, all-inclusive intrusion prevention system that secures every type of internal and external access to the IBM i server. It enables you to easily detect remote network accesses and, most importantly, implement real-time alerts.
iSecurity Multi Factor Authentication
iSecurity provides Multi Factor Authentication simply, inside the IBM i, as part of the user’s initial program, prompting for MFA at sign-on. No need for multiple login steps — one step is enough.
DB-Gate even enables interactive STRSQL over remote databases.
No need to learn special calls. Forget using APIs.
Designed especially for large organizations, it is a game-changer.
- Based on standard IBM i exit point unique technology
- Native standard integration with RPG, COBOL, STRSQL
- Expands IBM i to other databases
- IBM i server authentication integration automatically injects user/password
By providing a timeline report of all changes relating to application data, iSecurity AP-Journal reduces unauthorized activity and enables users to meet regulatory requirements. iSecurity AP-Journal also issues real-time alerts to inform managers of any changes in application databases or unapproved access to critical data.
iSecurity Audit enhances native IBM i auditing by monitoring and reporting on all activities in the IBM i environment. It employs real-time detection to identify security events as they occur and record details in a log file. iSecurity Audit offers the most powerful and ﬂexible reporting features available today. It includes more than eighty ready-to-run queries and reports.