Raz-Lee Security

Raz-Lee's flagship iSecurity suite protects organizations against insider and outside threats, preventing unauthorized access to business-critical information. Raz-Lee is committed to providing comprehensive IBM i compliance, auditing and security solutions.
Solutions by Raz-Lee Security
iSecurity Anti-Ransomware
Your IBM i is facing these threats right now.
Get yourself secured.
Key features:
- Stop ransomware attacks as they start
- Both known and zero-day ransomware
- Alert by email, send message to SIEM
- New attack simulator
- Installed on IBM i
Featured resource
iSecurity Antivirus
iSecurity Antivirus software cannot be disabled by any known virus, runs Locally at the IBM i or it can be executed on ICAP Client Mode releasing all the processing load to specific and trusted servers and gives to you the power to choose the Antivirus Database Provider.
Featured resource
iSecurity Firewall
iSecurity Firewall is a comprehensive, all-inclusive intrusion prevention system that secures every type of internal and external access to the IBM i server. It enables you to easily detect remote network accesses and, most importantly, implement real-time alerts.
Featured resource
iSecurity Multi Factor Authentication
iSecurity provides Multi Factor Authentication simply, inside the IBM i, as part of the user’s initial program, prompting for MFA at sign-on. No need for multiple login steps — one step is enough.
Featured resource
iSecurity DB-Gate
DB-Gate even enables interactive STRSQL over remote databases.
No need to learn special calls. Forget using APIs.
Designed especially for large organizations, it is a game-changer.
Key features:
- Based on standard IBM i exit point unique technology
- Native standard integration with RPG, COBOL, STRSQL
- Expands IBM i to other databases
- IBM i server authentication integration automatically injects user/password
Featured resource
iSecurity AP-Journal
By providing a timeline report of all changes relating to application data, iSecurity AP-Journal reduces unauthorized activity and enables users to meet regulatory requirements. iSecurity AP-Journal also issues real-time alerts to inform managers of any changes in application databases or unapproved access to critical data.
Featured resource
iSecurity Audit
iSecurity Audit enhances native IBM i auditing by monitoring and reporting on all activities in the IBM i environment. It employs real-time detection to identify security events as they occur and record details in a log file. iSecurity Audit offers the most powerful and flexible reporting features available today. It includes more than eighty ready-to-run queries and reports.