Raz-Lee Adds Zero-Trust Features To IBM i Firewall
Raz-Lee CEO Shmuel Zailer recently explained to IT Jungle how micro-segmentation enables zero-trust security in Firewall. “The idea of micro-segmentation comes to
Ransomware attacks on IBM i and viruses spread by the IFS require special attention. Such attacks damage companies to the extent that they have to seize their activities.
iSecurity helps companies meet their IBM i security and regulatory requirements in this area.
Detects and isolates the threat, and prevents it from damaging valuable data.
IFS virus checks and scans, Native Object Integrity checks, alert by email and by Syslog.
Gives to you the power to choose the Antivirus Database Provider.
iSecurity Auditing products help companies meet their IBM i auditing requirements by providing best-in-class reporting and monitoring solutions that secure their business-critical databases.
Real-time monitoring for QAUDJRN, QIPFILTER, QIPNAT, QACGJRN, QQOS, QSNMP, QDSNX, QVPNQZMF, QHST User Activity and more. Schedule Reports and Security status.
Audit by recording of 5250 screen activity for end-to-end audit trails with search and playback capabilities.
Automatic tracking of changes to production libraries with the sources used to create the programs.
Stay in compliance. Plan, Check and Set parameters and authorities of User Profiles, Native Objects and IFS.
Proactive response in real-time to any security event by Email, SMS, Syslog, SNMP, and CL script processor.
Each module in our comprehensive security solutions for IBM i is designed to work independently or collectively to secure remote access, control user authorities and secure objects.
Effective Protection against any situation that could compromise security and reliability for IBM i. Native Firewall Solution to control every Exit Point, besides control for Commands and Updating Files in Software Development Environments.
Network security, controlling Exit Points, Open DB’s and SSH. Rule Wizards and graphical BI.
Control validity of System and User commands and their parameters, per user, IP, time, etc.
Regulates update files in production libraries. It provides a new security layer.
Raz-Lee has developed several evaluation, reporting and alert solutions for assessing security risks, analyzing data and presenting actionable information to help executives, managers and other corporate end users make informed business decisions.
Easy to define and integrate with IBM QRadar, Tivoli, RSA, ArcSight, and more.
Intuitive Graphical BI analysis of security data, supports “drill” to specific events.
Single view for Network-wide PCI, site-defined compliance checks for multiple LPARS.
Analyzes and scores IBM i security definitions, suggests corrections and solutions.
Works with IBM’s Authority Collection data. It reads, summarizes and analyzes users.
Real-time DB activity including READ. Compares values by fields, Alerts and Reports.
Standard Native access to Oracle, MSSQL/MySQL, from STRSQL, RPG, COBOL.
SOX enabled File editor with UNDO capability and Log record of Changes.
Any organization that stores, processes or transmits cardholder data is required to comply with the PCI DSS standard.
Legislative audit requirements to protect investors by improving the accuracy and reliability of corporate disclosures
The General Data Protection Regulation reinforces and binds together information security for all people inside the European Union (EU).
A group of regulations that combat waste, fraud, and abuse in health care delivery and health insurance.
Our Development Team is always improving our produts.
iSecurity Suite is Native to IBM i so no additional structure is needed.
Partnerships with major global SIEM & DAM solution providers.
Users can choose to work on Green Screen or GUI (Windows).
Raz-Lee CEO Shmuel Zailer recently explained to IT Jungle how micro-segmentation enables zero-trust security in Firewall. “The idea of micro-segmentation comes to
Nanuet, New York – December 18, 2023 – Raz-Lee Security Inc announces an improvement for iSecurity Action. Example to using Commands in Action If
Receive our latest blog posts directly in your inbox!