

Raz-Lee Security is a provider of comprehensive cybersecurity and compliance solutions tailored for IBM i servers. With over 30 years of expertise, their flagship iSecurity suite encompasses more than 20 individual products designed to protect business-critical databases and applications from both internal and external threats. These solutions address various aspects of information security, including network access control, application security, real-time auditing, user profile management, and compliance with industry regulations such as PCI, SOX, and HIPAA. Key Features and Functionality: - Auditing & Response: Real-time monitoring of system activities, including user actions and system events, with capabilities for immediate alerts and automated responses to security incidents. - Advanced Threat Protection: Modules like Anti-Ransomware and Antivirus provide proactive defense mechanisms against malware and ransomware attacks, ensuring the integrity of data stored on IBM i servers. - Authentication & Authorization: Features such as Multi-Factor Authentication and Password Reset enhance user access security, while Authority on Demand offers temporary elevated privileges when necessary. - Encryption: Field Encryption and Open PGP Encryption secure data at rest and in transit, utilizing robust encryption algorithms to protect sensitive information. - Network Protection: The Firewall module controls network access points, monitors open databases and SSH connections, and includes rule wizards for simplified configuration. - Evaluation, Reporting & Alerts: Tools like Compliance Evaluator and Visualizer provide comprehensive assessments of security configurations, generate detailed reports, and offer intuitive graphical analyses of security data. Primary Value and Problem Solved: Raz-Lee Security's iSecurity suite delivers a holistic approach to safeguarding IBM i environments, addressing the unique security challenges faced by organizations using these systems. By integrating real-time monitoring, advanced threat protection, robust authentication mechanisms, and comprehensive compliance tools, iSecurity ensures that businesses can protect their critical data assets, maintain regulatory compliance, and mitigate risks associated with both internal vulnerabilities and external cyber threats. This comprehensive protection empowers organizations to operate securely and confidently within their IBM i infrastructure.

iSecurity Firewall is a comprehensive, all-inclusive intrusion prevention system that secures every type of internal and external access to the IBM i server. It enables you to easily detect remote network accesses and, most importantly implement real-time alerts.

iSecurity Authority on Demand provides an advanced solution for emergency access to critical application data and processes, which is one of the most common security slips identifiable to auditors in IBM i audits. Current manual approaches to such situations are not only error-prone, but do not comply with regulations and auditor’s often stringent security requirements.

iSecurity Capture is a 5250 screen tracking solution that silently photographs, saves and plays back user sessions on the IBM i server. Screens are captured and stored in real-time, arranged according to individual capture 'sessions', easily retrievable, have flexible scrolling, and a powerful free-text search engine. Capture complements journals and reports with a visual audit trail of user activity.

iSecurity Compliance Management gives administrators the ability to plan and define security levels per object based on name and type. The challenge of securing both Native and Integrated File System (IFS) OS/400 objects is the basis for all IBM i security due to the unique object-based architecture of the operating system and the fact that user-rights for accessing objects are checked for all operations, whether batch, interactive or over-the-web. Since OS/400 requires authorizations to be defined per each object in the system, this activity is cumbersome, error-prone and difficult to maintain.

iSecurity Assessment is a Windows-based program for in-depth analysis of the full scope of the iSeries server (System i or AS/400) security strengths and weaknesses, pinpointing the security risks which should be addressed. The output is a detailed report, grading each facet of iBM i security, with full explanations.

The iSecurity Compliance Evaluator provides managers, auditors and systems administrators a quick, network-wide, comprehensive overview of their IBM i server’s compliance level with government, industry and corporate regulations. It provides concise one-page reports featuring an overall compliance score, as well as specific ratings for any security-related component of IBM i, such as system values, network attributes and user profiles. The reports also include useful operational information deriving from QAUDJRN and from network activity. The result is a colorful and user-friendly Excel spreadsheet which provides three different views: general, summary, and exceptions only displays.

FileScope is recognized by iSeries professionals the world over as the leading iSeries product in the area of data manipulation. FileScope provides unprecedented file editing capabilities, while adhering to the highest standards of quality, reliability and performance.

iSecurity Field Encryption, offered by Raz-Lee Security, is a comprehensive data encryption solution designed to protect sensitive data within IBM i environments. This product ensures that critical information, such as personal data, financial details, and other sensitive attributes, are encrypted at the field level, thereby enhancing security and compliance with regulations such as GDPR, PCI DSS, and HIPAA.Field Encryption by Raz-Lee employs strong encryption algorithms to secure data while maintaining performance efficiency. It provides dynamic data masking to secure data access dynamically and enables restricted access to sensitive data, ensuring that only authorized personnel can view or modify it. The solution is tailored to seamlessly integrate into existing IBM i systems, enhancing security without disrupting operational workflows.The configurability of Raz-Lee's Field Encryption allows organizations to apply encryption based on specific fields within databases, giving businesses a flexible and focused approach to data security. The product also includes auditing capabilities to track access and changes to encrypted fields, supporting adherence to strict security and compliance mandates.