Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee  Internationally renowned iSeries solutions provider  Founded in 1983  100% focused on.

Slides:



Advertisements
Similar presentations
Firewall End-to-End Network Access Protection for System i.
Advertisements

DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
OneBridge Mobile Data Suite Product Positioning. Target Plays IT-driven enterprise mobility initiatives Extensive support for integration into existing.
XProtect ® Professional Efficient solutions for mid-sized installations.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
Syslog for SIEM using iSecurity Real-Time Monitoring of IBM i Security Events.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
T-FLEX DOCs PLM, Document and Workflow Management.
Experience, Technology and Focus in Mid Market CRM Soffront Asset management: An Overview.
Active Directory: Final Solution to Enterprise System Integration
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
Charles James Director Microsoft Alliance EMEA Polycom Microsoft UC Innovation Partner of the Year.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Partner Program Channel Sales Management Jay Thakker
1 Password Reset Effortless, Self service User Password Reset.
© Softmark Continuous Availability Operational Simplicity Financial Advantage Secure Your Stratus Systems VOS Auditor.
© InLoox ® InLoox PM Web App product presentation The Online Project Software.
XProtect ® Essential Brilliant simplicity. With support for up to 26 cameras, XProtect Essential is cost-efficient and easy to use IP video surveillance.
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
Grid Computing Veronique Anxolabehere Senior Director of Product Marketing Mike Margulies Senior Director, Grid Platform Solutions.
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
RiT Technologies Partner Program Committed to Your Success.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
WP6: Grid Authorization Service Review meeting in Berlin, March 8 th 2004 Marcin Adamski Michał Chmielewski Sergiusz Fonrobert Jarek Nabrzyski Tomasz Nowocień.
SOA Landscape Recommendations By >. Who we are  Team Members  Company History  Current & Past Client Projects  Note: have fun here. Make up your history.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
BUSINESS DRIVEN TECHNOLOGY
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
1 Authority on Demand Flexible Access Control Solution.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Businesses understand the importance of branded communications … but have neglected to brand one of the most visible and prevalent 1-to-1 communications.
Module 9 Configuring Messaging Policy and Compliance.
Firewall End-to-End Network Access Protection for IBM i.
Copyright © 2015 Risk Decisions. All rights reserved | Project Risk Management – confidence to deliver: on budget, on time, every.
Module 11: Remote Access Fundamentals
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
© 2008 IBM Corporation ® IBM Cognos Business Viewpoint Miguel Garcia - Solutions Architect.
1 Automatic Tracing of Program and File Changes on IBM i Inside Change Tracker.
1 Action Automated Security Breach Reporting and Corrections.
Firewall End-to-End Network Access Protection for IBM i.
HP and Microsoft Solutions for Microsoft Exchange Server 2007 with HP Servers and Storage Presented by: Plaza Dynamics.
1 Adding Secure and Collaboration to Your Business with SCOoffice Server 4.1.
Pedigree: Network-wide Protection Against Enterprise Data Leaks Team: Nick Feamster, Assistant Professor, School of CS Anirudh Ramachandran, PhD candidate,
Introduction to Information Security
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
12/23/2015Software Assist Corporation1 “Most companies have little idea how pervasive FTP activity is in their organizations because FTP is no longer just.
Chapter 4 Intranets and Extranets. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
Michael Miller Senior Director Real-Time Collaboration Products Oracle Collaboration Suite 10g Oracle Corporation.
Integration – Powerful Connections Made Easy Mike Tenholder, SMMC Senior Sales Engineer Melissa Lombardi Marketing Associate V2.4, August 2015.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Syslog for SIEM Products Using iSecurity Real-Time Monitoring of IBM i Security Events.
Introduction to Barracuda IM Firewall
PLM, Document and Workflow Management
Network Interface Panel Proposition
Vertex & EnterpriseOne
InLoox PM Web App product presentation
Searchable. Secure. Simple.
Modular Object Scanning Technology (MOST)
iSecurity AP Journal Training
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Raz-Lee Security iSecurity for iSeries

2 Facts about Raz-Lee  Internationally renowned iSeries solutions provider  Founded in 1983  100% focused on the AS/400 – iSeries  More than 20 unique iSeries products  Since 2000: Develop, Market & Support Security Products  More than 12,000 licenses worldwide  Worldwide Distribution Network

3 iSecurity Customers (partial list)

4 Our Global Distribution Network

5 Product Suites Market positioning to present logical product sets to various market segments and applications  Silver Geared to SMB and similar installations without a System Administrator Easily maintained by user staff  Gold Geared to mainstream iSeries market Includes tools useful to System Administrator in a corporate or larger business environment  Platinum Includes all of iSecurity Gold plus Anti-Virus  All modules also sold individually

6 Product Suites - Composition ModuleSilverGoldPlatinum IndividuallyGUI User Management  Password Manager  Screen  Capture  Visualizer  Firewall  Anti-Virus  System Control  iSecurity Assessment  View  Journal  Audit  Action 

7 iSecurity Benefits & Advantages  Modular yet integrated end-to-end iSeries security solution provides total security protection  Many products are unique, with little or not competition!  Top Down Architecture & Best Fit Algorithm: Exceptional performance in large enterprises  Easy to use: Superior human engineering and native and GUI Interfaces Major Selling Points:

8 iSecurity - Products Overview Comprehensive, end-to-end Security for the iSeries…

9 iSecurity - Products Overview …with reporting feedback loops!

10 Application Scenarios Following is a series of application scenarios that provide examples of iSecurity product usage. 1- Excel access to IFS storage 2- Secure FTP Access 3- Secure Client Access Exit Application Scenarios

11 Excel from IFS- 1/3 Use Windows Copy/Paste to successfully access iSeries IFS storage

12 Excel from IFS- 2/3 Screens for setting Allow/Reject access to specified servers, including support for filtering verbs

13 Excel from IFS- 3/3 When rejected, this message will appear. Not authorized to use Excel OR not authorized to access the file OR not authorized to initiate the type of operation attempted!

14 Use FTP to create a library, delete a library and power down the system! Or, read a file, update it, and write the file back, all using FTP. Secure FTP Access- 1/2

15 Secure FTP Access- 2/2

16 Secure Client Access- 1/3

17 Secure Client Access- 2/3

18 Secure Client Access- 3/3

19 “… (We) implemented the iSecurity modules in order to hermetically close off all security-related exposure in our iSeries systems. Besides offering us maximum protection and flexibility, iSecurity also provides reports used by our systems managers and auditors to assure full compliance with government regulations… We heartily recommend the iSecurity products to other companies.” Avishai Shliwkovitz, Director of Operations & Infrastructure, Leumit Health Fund What iSecurity Customers Say (1)

20 “… We are using the iSecurity modules in a number of ways. First of all, Firewall addresses our requirements for a flexible, easily configurable network access product which addresses all security- related exit points in our computer. The Audit and Action modules work together to catch potential security exposures in real-time and to automate responses to these exposure by sending SMS messages and s to relevant personnel at our shop. We appreciate the efforts of Raz-Lee Security’s support staff which is able to solve any issues which arise in an expeditious and professional manner..” Rami Perry, IT Manager, The Israel Act Pool What iSecurity Customers Say (2)

21 End-to-End iSeries Security Thank You!