Product Avatar Image

iSecurity Field Encryption

Show rating breakdown
32 reviews
  • 17 profiles
  • 16 categories
Average star rating
4.4
Serving customers since
1983

Featured Products

Profile Filters

All Products & Services

Product Avatar Image
Raz Lee Security (2001) LTD

0 reviews

Raz-Lee Security is a provider of comprehensive cybersecurity and compliance solutions tailored for IBM i servers. With over 30 years of expertise, their flagship iSecurity suite encompasses more than 20 individual products designed to protect business-critical databases and applications from both internal and external threats. These solutions address various aspects of information security, including network access control, application security, real-time auditing, user profile management, and compliance with industry regulations such as PCI, SOX, and HIPAA. Key Features and Functionality: - Auditing & Response: Real-time monitoring of system activities, including user actions and system events, with capabilities for immediate alerts and automated responses to security incidents. - Advanced Threat Protection: Modules like Anti-Ransomware and Antivirus provide proactive defense mechanisms against malware and ransomware attacks, ensuring the integrity of data stored on IBM i servers. - Authentication & Authorization: Features such as Multi-Factor Authentication and Password Reset enhance user access security, while Authority on Demand offers temporary elevated privileges when necessary. - Encryption: Field Encryption and Open PGP Encryption secure data at rest and in transit, utilizing robust encryption algorithms to protect sensitive information. - Network Protection: The Firewall module controls network access points, monitors open databases and SSH connections, and includes rule wizards for simplified configuration. - Evaluation, Reporting & Alerts: Tools like Compliance Evaluator and Visualizer provide comprehensive assessments of security configurations, generate detailed reports, and offer intuitive graphical analyses of security data. Primary Value and Problem Solved: Raz-Lee Security's iSecurity suite delivers a holistic approach to safeguarding IBM i environments, addressing the unique security challenges faced by organizations using these systems. By integrating real-time monitoring, advanced threat protection, robust authentication mechanisms, and comprehensive compliance tools, iSecurity ensures that businesses can protect their critical data assets, maintain regulatory compliance, and mitigate risks associated with both internal vulnerabilities and external cyber threats. This comprehensive protection empowers organizations to operate securely and confidently within their IBM i infrastructure.

Product Avatar Image
iSecurity Firewall

0 reviews

iSecurity Firewall is a comprehensive, all-inclusive intrusion prevention system that secures every type of internal and external access to the IBM i server. It enables you to easily detect remote network accesses and, most importantly implement real-time alerts.

Product Avatar Image
iSecurity Authority on Demand

0 reviews

iSecurity Authority on Demand provides an advanced solution for emergency access to critical application data and processes, which is one of the most common security slips identifiable to auditors in IBM i audits. Current manual approaches to such situations are not only error-prone, but do not comply with regulations and auditor’s often stringent security requirements.

Product Avatar Image
iSecurity Capture

0 reviews

iSecurity Capture is a 5250 screen tracking solution that silently photographs, saves and plays back user sessions on the IBM i server. Screens are captured and stored in real-time, arranged according to individual capture 'sessions', easily retrievable, have flexible scrolling, and a powerful free-text search engine. Capture complements journals and reports with a visual audit trail of user activity.

Product Avatar Image
iSecurity Compliance Management

0 reviews

iSecurity Compliance Management gives administrators the ability to plan and define security levels per object based on name and type. The challenge of securing both Native and Integrated File System (IFS) OS/400 objects is the basis for all IBM i security due to the unique object-based architecture of the operating system and the fact that user-rights for accessing objects are checked for all operations, whether batch, interactive or over-the-web. Since OS/400 requires authorizations to be defined per each object in the system, this activity is cumbersome, error-prone and difficult to maintain.

Product Avatar Image
iSecurity Assessment

0 reviews

iSecurity Assessment is a Windows-based program for in-depth analysis of the full scope of the iSeries server (System i or AS/400) security strengths and weaknesses, pinpointing the security risks which should be addressed. The output is a detailed report, grading each facet of iBM i security, with full explanations.

Product Avatar Image
iSecurity Compliance Evaluator

0 reviews

The iSecurity Compliance Evaluator provides managers, auditors and systems administrators a quick, network-wide, comprehensive overview of their IBM i server’s compliance level with government, industry and corporate regulations. It provides concise one-page reports featuring an overall compliance score, as well as specific ratings for any security-related component of IBM i, such as system values, network attributes and user profiles. The reports also include useful operational information deriving from QAUDJRN and from network activity. The result is a colorful and user-friendly Excel spreadsheet which provides three different views: general, summary, and exceptions only displays.

Product Avatar Image
iSecurity FileScope

0 reviews

FileScope is recognized by iSeries professionals the world over as the leading iSeries product in the area of data manipulation. FileScope provides unprecedented file editing capabilities, while adhering to the highest standards of quality, reliability and performance.

Profile Name

Star Rating

21
10
1
0
0

iSecurity Field Encryption Reviews

Review Filters
Profile Name
Star Rating
21
10
1
0
0
Péter G.
PG
Péter G.
Process Manager at Nokia
09/12/2024
Validated Reviewer
Review source: G2 invite
Incentivized Review

iLikeit product

That the software protects not only production data but your test environments also. This also applies to anything related to the overall product and any enhancements related to it.
RN
raj N.
08/31/2024
Validated Reviewer
Review source: Organic

Best Platform For Security Audit and i loved it

Their are many kinds of safety highlights what we get from the I security Review and their easy to use interface make them more helpful and dependable for us. They have numerous elements that tackle our inquiries and make our work extremely secure and bother free. The mix cycle of I security Review have extremely easy to understand and client support alwayws be their to furnish assist with each and every means.
PC
Pinkie C.
08/21/2024
Validated Reviewer
Review source: G2 invite
Incentivized Review

Best Platform For Security Audit

Their are many types of security features what we get from the I security Audit and their user friendly interface make them more useful and reliable for us. They have multiple features that solve our queries and make our work very secure and hassle free. The integration process of I security Audit have very user friendly and user support alwayws be their to provide help with every single steps.

About

Contact

HQ Location:
Nanuet, NY

Social

@razleesecurity

What is iSecurity Field Encryption?

iSecurity Field Encryption, offered by Raz-Lee Security, is a comprehensive data encryption solution designed to protect sensitive data within IBM i environments. This product ensures that critical information, such as personal data, financial details, and other sensitive attributes, are encrypted at the field level, thereby enhancing security and compliance with regulations such as GDPR, PCI DSS, and HIPAA.Field Encryption by Raz-Lee employs strong encryption algorithms to secure data while maintaining performance efficiency. It provides dynamic data masking to secure data access dynamically and enables restricted access to sensitive data, ensuring that only authorized personnel can view or modify it. The solution is tailored to seamlessly integrate into existing IBM i systems, enhancing security without disrupting operational workflows.The configurability of Raz-Lee's Field Encryption allows organizations to apply encryption based on specific fields within databases, giving businesses a flexible and focused approach to data security. The product also includes auditing capabilities to track access and changes to encrypted fields, supporting adherence to strict security and compliance mandates.

Details

Year Founded
1983
Website
razlee.com