Download presentation
Presentation is loading. Please wait.
Published byConstance Cordelia McCormick Modified over 9 years ago
1
iSecurity Complete Product Series For System i
2
About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System i 3 product lines: iSecurity Infrastructure Security iSecurity Application Security Scope system tools: file editor, performance tuning Over 12,000 licenses worldwide Installed in over 30 countries worldwide Worldwide distribution network IBM Advanced Business Partner
3
Raz-Lee’s Global Distribution Network
4
Selected iSecurity Banking Customers
5
Compliance Evaluator Visualizer Evaluation Protection Firewall Authority on Demand Anti-Virus Screen Password Action Native Object Security Databases AP-Journal View FileScope iSecurity Overview Assessment PCI, HIPAA, SOX or Security Breach or Management Decision 2 Auditing Audit Capture User Management System Control User Profile Replication System Value Replication Central Admin 3 4 5 7 6 8 1
6
Auditing (1) Audit – Tool for compliance with security regulation, including over 300 customizable reports in user- selected formats which can be automatically scheduled. Capture - Captures green screen user images, archives them offline, and enables searching screen sessions and playing back user sessions. User Management - Manages and monitors all user profile-related definitions.
7
Auditing (2) System Control - Ensures increased availability of a site’s services via ongoing, overall control and tuning of resources. User Profile & Password Replication - Ensures that user profile information is consistent in multi-system & multi-LPAR environments. System Value Management & Replication - Ensures that system values are consistent in multi-system and multi-LPAR environments. System values can be set to optimal, baseline or specific values. Central Administration - manages multiple systems from a single control point.
8
Protection (1) Firewall - provides total protection from intrusions, viruses, and unauthorized uses – at all 53 iSeries security-related exit points. Supports IDS (Intrusion Detection System) alerts. Authority on Demand - Enforces segregation of duties and provides audit trail for special authority requests. Anti-Virus - Scans files and email attachments for PC viruses, and tracks unauthorized use of standard IBM APIs.
9
Protection (2) Screen - Personalized protection and security of unattended workstations, ensuring full network security server control. Password - Full password management including site-defined password policies and enforcement, GUI-based password related reports and extensive batch reporting. Action - an essential part of the IDS (Intrusion Detection System) that includes real-time alarms and protective response mechanisms. Native Object Security - Easily defines security levels per object and object type. Checks for inconsistencies between actual and planned settings.
10
Databases AP-Journal - Issues real-time threshold- activated alerts indicating changes in business-critical data. Generates cross- application reports displaying all database changes on a single timeline. View - Restricts access of unauthorized users to specific database records or to specific fields. Protects and controls display of classified data on screen Filescope - a data manipulation product which provides advanced file editing capabilities, adhering to the highest standards of quality, reliability and performance.
11
Evaluation Compliance Evaluator - quickly checks the compliance of System i with industry and corporate policies based on customizable user- friendly reports. Visualizer - a Business Intelligence System for display and analysis of data from the iSeries server (System i or AS/400).
12
iSecurity Product Index Prevention Pack Firewall Visualizer for Firewall Password Screen Assessment Compliance Pack Audit Visualizer for Audit Action System Control Assessment Application Security Suite AP-Journal Capture View Individual Products Compliance Evaluator Authority on Demand Native Object Security User Profile & System Value Replication Central Administration Anti-Virus
13
Please visit us at www.razlee.com Thank You!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.