Skip to main content

Raz-Lee Security

IBM i is different from other systems. Securing it requires expertise. Raz-Lee Security is one of the only IBM i security providers that concentrates on the IBM i. Raz-Lee delivers high-level security solutions, enabling organizations to comply with global regulations such as GDPR, PCI and SOX.

Raz-Lee’s flagship iSecurity suite protects against insider and outside threats, preventing unauthorized access to business-critical information. Raz-Lee is committed to providing comprehensive IBM i compliance, auditing and security solutions.

iSecurity Anti-Ransomware quickly detects high-volume cyber threats deployed from an external
source, isolates the threat and prevents it from damaging valuable data.

Learn More

iSecurity DB-Gate empowers IBM i customers with exciting data access capabilities, based on open database connectivity, employing standard IBM i facilities to enable fully database transparent access to remote systems.

Learn More

iSecurity Antivirus software cannot be disabled by any known virus, runs locally at the IBM i or can be executed on ICAP Client Mode releasing all the processing load to specific and trusted servers and gives to you the power to choose the antivirus database provider.

Learn More

iSecurity Firewall is a comprehensive, all-inclusive intrusion prevention system that secures every type of internal and external access to the IBM i server. It enables you to easily detect remote network access and—most importantly—implement real-time alerts.

Learn More

iSecurity provides multifactor authentication (MFA) simply, inside the IBM i, as part of the user’s initial program, prompting for MFA at sign-on. No need for multiple login steps—one step is enough.

Learn More

By providing a timeline report of all changes relating to application data, iSecurity AP-Journal reduces unauthorized activity and enables users to meet regulatory requirements. iSecurity AP-Journal also issues real-time alerts to inform managers of any changes in application databases or unapproved access to critical data.

Learn More

iSecurity Audit enhances native IBM i auditing by monitoring and reporting on all activities in the IBM i environment. It employs real-time detection to identify security events as they occur and record details in a log file. iSecurity Audit offers the most powerful and flexible reporting features available today. It includes more than 80 ready-to-run queries and reports.

Learn More

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.