Download presentation
Presentation is loading. Please wait.
Published bySimon Norman Modified over 9 years ago
1
Raz-Lee Security iSecurity for iSeries
2
2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on the AS/400 – iSeries More than 20 unique iSeries products Since 2000: Develop, Market & Support Security Products More than 12,000 licenses worldwide Worldwide Distribution Network
3
3 iSecurity Customers (partial list)
4
4 Our Global Distribution Network
5
5 Product Suites Market positioning to present logical product sets to various market segments and applications Silver Geared to SMB and similar installations without a System Administrator Easily maintained by user staff Gold Geared to mainstream iSeries market Includes tools useful to System Administrator in a corporate or larger business environment Platinum Includes all of iSecurity Gold plus Anti-Virus All modules also sold individually
6
6 Product Suites - Composition ModuleSilverGoldPlatinum IndividuallyGUI User Management Password Manager Screen Capture Visualizer Firewall Anti-Virus System Control iSecurity Assessment View Journal Audit Action
7
7 iSecurity Benefits & Advantages Modular yet integrated end-to-end iSeries security solution provides total security protection Many products are unique, with little or not competition! Top Down Architecture & Best Fit Algorithm: Exceptional performance in large enterprises Easy to use: Superior human engineering and native and GUI Interfaces Major Selling Points:
8
8 iSecurity - Products Overview Comprehensive, end-to-end Security for the iSeries…
9
9 iSecurity - Products Overview …with reporting feedback loops!
10
10 Application Scenarios Following is a series of application scenarios that provide examples of iSecurity product usage. 1- Excel access to IFS storage 2- Secure FTP Access 3- Secure Client Access Exit Application Scenarios
11
11 Excel from IFS- 1/3 Use Windows Copy/Paste to successfully access iSeries IFS storage
12
12 Excel from IFS- 2/3 Screens for setting Allow/Reject access to specified servers, including support for filtering verbs
13
13 Excel from IFS- 3/3 When rejected, this message will appear. Not authorized to use Excel OR not authorized to access the file OR not authorized to initiate the type of operation attempted!
14
14 Use FTP to create a library, delete a library and power down the system! Or, read a file, update it, and write the file back, all using FTP. Secure FTP Access- 1/2
15
15 Secure FTP Access- 2/2
16
16 Secure Client Access- 1/3
17
17 Secure Client Access- 2/3
18
18 Secure Client Access- 3/3
19
19 “… (We) implemented the iSecurity modules in order to hermetically close off all security-related exposure in our iSeries systems. Besides offering us maximum protection and flexibility, iSecurity also provides reports used by our systems managers and auditors to assure full compliance with government regulations… We heartily recommend the iSecurity products to other companies.” Avishai Shliwkovitz, Director of Operations & Infrastructure, Leumit Health Fund What iSecurity Customers Say (1)
20
20 “… We are using the iSecurity modules in a number of ways. First of all, Firewall addresses our requirements for a flexible, easily configurable network access product which addresses all security- related exit points in our computer. The Audit and Action modules work together to catch potential security exposures in real-time and to automate responses to these exposure by sending SMS messages and e-mails to relevant personnel at our shop. We appreciate the efforts of Raz-Lee Security’s support staff which is able to solve any issues which arise in an expeditious and professional manner..” Rami Perry, IT Manager, The Israel Act Pool What iSecurity Customers Say (2)
21
21 End-to-End iSeries Security Thank You!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.