1 iSecurity GUI for User Management. 2 Internationally renowned IBM i solutions provider Founded in 1983, 100% focused on IBM i Corporate offices in:

Slides:



Advertisements
Similar presentations
Firewall End-to-End Network Access Protection for System i.
Advertisements

COMPANY’S OVERVIEW & SOFTWARE DEFINATION.
1 Central Administration Advanced Management of Multiple Systems.
1 Authority on Demand Flexible Access Control Solution.
Syslog for SIEM using iSecurity Real-Time Monitoring of IBM i Security Events.
Authority on Demand Control Authority Rights & Emergency Access.
© 2013 IBM Corporation IBM Security Systems 1 © 2013 IBM Corporation Identity Management And Session Recording A Partnership with IBM and ObserveIT.
Hacking Capture Save and Playback User Session Screens.
1 Visualizer for Audit Graphical Business Intelligence Display & Analysis Tool.
This presentation is intended as a detailed WebEx, to bring potential customers to an understanding of Dream Report capabilities. This presentation focuses.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Compliance on Demand. Introduction ComplianceKeeper is a web-based Licensing and Learning Management System (LLMS), that allows users to manage all Company,
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
CategoryCapability + Recommended Tool Analysis Self Service BI with Power View integration Ad-Hoc (e.g. user defined) views Interactive analysis.
SYSLOG Real-Time Monitoring of System i Events. What is SYSLOG? Multi server environments are now the reality at most sites; however the number of operators.
Bar|Scan ® Asset Inventory System The leader in asset and inventory management.
1 Audit Next Generation Monitoring, Compliance & QAUDJRN Reporting.
1 System Control & MSGQ. 2 System Control & MSGQ Features Uses QSYSOPR or any application message queue data as input to iSecurity Action module Enables.
1 Password Reset Effortless, Self service User Password Reset.
ISecurity End-to-End Security. Part 1 Overview About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Audit Next Generation Monitoring, Compliance & Reporting
1 Compliance Evaluator Single-View Overall Compliance Reports.
1 Action Automated Security Breach Reporting and Corrections.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
AP-Journal Application Security & Business Analysis.
1 Visualizer for Firewall Graphical Business Intelligence Display & Analysis Tool.
Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee  Internationally renowned iSeries solutions provider  Founded in 1983  100% focused on.
Corporate Profile Contact Arvind Verma
This presentation will guide you though the initial stages of installation, through to producing your first report Click your mouse to advance the presentation.
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.
1. 2 Presentation outline » IT pain points » The product » Testimonials » Kudos » Conclusion.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Firewall End-to-End Network Access Protection for IBM i.
1 Visualizer for Firewall Display & Analysis Tool.
SQL Server 2005 Reporting Services: Product Overview Niran Luckcanakul (MCSD, MCDBA, MCT) Project manager ISONET Co.,Ltd.
1 Capture 5250 with Business Items. 2 Internationally renowned IBM i solutions provider Founded in 1983, 100% focused on IBM i Corporate offices in: US,
1 May 2011 Removing the Hay to find… iBi: IBM i Business Intelligence BI Datathe Needles.
1 Automatic Tracing of Program and File Changes on IBM i Inside Change Tracker.
1 Action Automated Security Breach Reporting and Corrections.
Firewall End-to-End Network Access Protection for IBM i.
1 Visualizer for Audit Display & Analysis Tool. 2 Graphical presentation and analysis of Firewall data Graphical presentation and analysis of Audit data.
Is Your Business Ready For The Ultimate Business ERP Solution.
1 Anti Virus IBM i Anti-Virus Product. 2 Reality of Virus, Worms Malware.
1 PTF Tracker Automatic Tracking of PTFs and Software Changes.
1 Command Control and Monitor CL Commands. 2 Command- The Need CL commands control nearly all IBM functionality Monitoring, controlling and logging CL.
Wiseco Consultants Ltd. Sigma Report A Web Reporting for Business and Enterprises.
12/23/2015Software Assist Corporation1 “Most companies have little idea how pervasive FTP activity is in their organizations because FTP is no longer just.
2015 NetSymm Overview NETSYMM OVERVIEW December
1 Assessment Comprehensive Analysis of IBM i Security.
Integrated Mobile Marketing Platform Emergic mConnector Integrated -Mobile Marketing Platform Presented By: Sales Person Name ID: Mobile:
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Windows Small Business Server 2003 R2 Powering Small Businesses.
Slide 1 © 2016, Lera Technologies. All Rights Reserved. SAP BO vs SPLUNK vs OBIEE By Lera Technologies.
Encryption DB2 Field Encryption for IBM i. The Need for Encryption PCI-DSS, HIPAA, FDA 21 CFR Part 11, and other regulations Use cases: Credit Card Numbers,
How Sage ERP X3 Systems Can Benefit Businesses.  Sage X3 is an affordable and flexible ERP solution designed to help mid-sized companies manage business.
Syslog for SIEM Products Using iSecurity Real-Time Monitoring of IBM i Security Events.
ISecurity for GDPR 1.
iSecurity Compliance with HIPAA
Software Application Overview
of our Partners and Customers
Capture 5250 with Business Items
© 2011 ZOHO Corp. All Rights Reserved
A 5-minute overview of ADAudit Plus
iSecurity Audit Training
iSecurity AP Journal Training
iSecurity Password-Reset Training
Presentation transcript:

1 iSecurity GUI for User Management

2 Internationally renowned IBM i solutions provider Founded in 1983, 100% focused on IBM i Corporate offices in: US, Italy, Germany, Israel Installed in over 40 countries, more than 12,000 licenses IBM Business Partner, Integration Partner with Tivoli and Q1Labs Partnerships with other major global security providers: Official partnerships with McAfee, RSA enVision, GFI SIEM, HP OEM by Imperva SecureSphere Proven integration with ArcSight, CA UniCenter, Splunk, Juniper… Worldwide distribution network About Raz-Lee Security

3 Raz-Lee’s Mission To provide the best and most comprehensive IBM i compliance, auditing and security solutions Infrastructure Security: network access, QAUDJRN monitor and report, user profile management and object authorities, automatic tracking of software changes, native object security, anti virus protection, all the above with multi-LPAR management capabilities Application Security: DB activity (journal) auditing, Cross-Application business item reporting with real-time alerting, Business Intelligence over transaction data, screen recording… Programmer and System tools: File editor, RPG/COBOL and interactive access to MS SQL, Oracle, MySQL, Excel,… Raz-Lee Security – Mission & Product Lines

4 Selected iSecurity Customers Some Banking Customers KUNDINKASSO FORENINGSSPARBANKE RISONA BANK BURAJIRU BANK SVENSKA HANDELSBANKEN-LUXEMB. MIZUHO CORPORATE BANK MIZUHO BANK ROYAL BANK OF SCOTLAND NUEVO BANCO DE SANTA FE KINKI OSAKA BANK BANK OF CHINA VENTURE BANK BANCO DI SARDEGNA FIRST GLOBAL BANK KANSAI URBAN BANK HSH-NORDBANK Some 2013 Customers TAIKO HEALTH INFO AG SOUTHERN WINE & SPIRITS BALLY TOTAL FITNESS WYOMING MACHINERY WILLIAM ADAMS BUTLER MACHINERY CATS ECOMMERCE FOLEY EQUIPMENT COMPANY CAPITAL AVESCO SANDS BETHLEHEM CASINO PANASONIC EXCEL STAFF SANYO ELECTRIC LOGISTICS

5 CHS (Community Health Systems, US) appx. 150 LPARs, replaced Powertech Royal Bank of Scotland purchased iSecurity after POCs of nearly ALL competitors! Venetian Casinos (multi-national) purchased iSecurity following extensive compliance POC. Euronet Worldwide banking clearinghouse in Europe & Asia, replaced competitor with iSecurity. Svenska Handelsbanken, one of the largest banks in Scandinavia, used competitor for several years; replaced it with iSecurity. Unicredit (IT Austria), SkyTV, IKO Industries, JPMorgan Chase, Boyd Gaming, Bank of China, MasterCard, Avis iSecurity: Selected Customers

6 iSecurity Products Overview & User Management Evaluation Compliance Evaluator for SOX, PCI, HIPAA… Visualizer- BI for security Syslog, SNMP for SIEM Auditing User Management & Replication Audit QAUDJRN, Status… Real-time Actions, CL scripts Capture screen activity Central Admin of LPARS Change/PTF Tracker Protection Firewall FTP, ODBC,… access Obtain Authority on Demand Monitor CL Commands Native Object Security Anti-Virus protection Databases DB-Gate: SQL to non-DB2 DBs (Oracle, MS SQL,…) AP-Journal for DB audit, filter, archive, real-time alerts View/hide sensitive data FileScope secured file editor Security Assessment FREE! PCI, HIPAA, SOX… Security Breach Management Decision

7 Full GUI and green screen Short learning curve, ease of use Visualizer Business Intelligence analysis Tens of built-in, customizable User Management reports via the Report/Query Generator & Scheduler offers print, screen, HTML, PDF, CSV ed reports User profile status can be sent to other systems as Syslog / SNMP / smartphone / operator / Twitter messages and as User Profile Password Reset solution offloads password re-setting responsibilities to the user NEW User Provisioning for enrolling hundreds of users quickly User Profile replication keeps user profile information in sync between LPARs & Systems iSecurity User Management - Characteristics

8 User Management in GUI Navigator Tree & User Profile Details

9 Easily Change User Attributes and Advanced Interface

10 Automatically Disable Inactive Users, allow for Exceptions

11 Visualizer Business Analysis! 1- Choose Security Officer Class 2- Users whose PW is *NONE 3- List them

12 Visualizer Business Intelligence- Analysis dimensions appear on bottom horizontal bar

13 Manage Users Signon Schedule- Enable / Disable

14 Tens of User Profile Reports provided which can be site- adapted in the lower Edit Query box

15 Visit us at Thank You!