Raz-Lee Security, Inc.
Raz-Lee Security is the leading security solution provider for IBM Power i, otherwise known as iSeries or AS/400 servers. With over 25 years of exclusive iSeries security focus, Raz-Lee has achieved outstanding development capabilities and expertise.
Raz-Lee is headquartered in New York, with a Technical Support and US Account Management center in San Francisco, and offices in Israel and Italy. Raz-Lee's flagship product series, iSecurity, is a comprehensive suite of security solutions for iSeries servers which enable companies to protect and monitor their valuable information assets against insider threat and unauthorized external access. Raz-Lee's solutions also enable enterprises to comply with the requirements of the Sarbannes-Oxley, PCI and HIPAA security regulations, and with COBIT implementation guidelines. iSecurity includes over 15 individual products securing not only companies' iSeries infrastructure, but also their business-critical databases. In addition, Raz-Lee concentrates on human engineering, making airtight security as easy as a click, even for non-technical personnel, such as auditors, managers and network administrators. Raz-Lee’s thousands of customers include many of the largest and best-known companies in Europe, the Americas and the Far East in industries such as banking, insurance, automotive, healthcare, government and consumer products. Worldwide distribution channels support the company's international clientele. Raz-Lee is an Advanced IBM Business Partner, carries the IBM Server Proven certification and partners with IBM in numerous markets worldwide. |
Listing Details
Action
0 reviewsAction is a powerful security solution that intercepts security breaches and other events in real-time and immediately takes appropriate corrective action. Actions may include sending e-mails and alert messages to key personnel and/or running command scri ... Read More...
Assessment
0 reviewsAssessment, part of the iSecurity suite, enables you to test your System i security vulnerability within minutes. Assessment checks your ports, sign-on attributes, user privileges, passwords, terminals, and more. Results are provided instantly, with score ... Read More...
Audit
0 reviewsAudit is a state-of-the-art security auditing application that examines events in real time, and triggers alerts and other responsive actions to potential threats. It contains a powerful report generator with over one hundred pre-defined reports. Audit is ... Read More...
FileScope
0 reviewsFileScope is recognized by System i professionals the world over as the leading product in the area of data manipulation. FileScope provides unprecedented file editing capabilities, while adhering to the highest standards of quality, reliability and perfo ... Read More...
Firewall
0 reviewsFirewall protects and secures all types of access, to and from the System i, within or outside the organization, under all types of communication protocols. This robust, cost-effective security solution is by far the most intuitive and easy-to-use securit ... Read More...
Journal
0 reviewsJournal automatically manages database changes by documenting and reporting exceptions made to the database journal. This unique security and organizational solution provides expert field-tracking and monitoring. Journal is a valuable tool for Sarbanes-Ox ... Read More...
Password
0 reviewsPassword is a general-purpose password management product that ensures user passwords cannot be easily guessed or cracked. The product includes the capability of integrating site-specific dictionaries defining illegal passwords. As the first line of defen ... Read More...
Screen
0 reviewsScreen is a terminal screen security product that protects unattended terminal screens, including PCs running terminal emulation software, from unauthorized use. Terminal abuse is difficult to prevent or detect because the transaction source cannot be rea ... Read More...
View
0 reviewsView provides top-notch record and field-level security by restricting access to specific fields and records in System i databases. View does not require recompilation of existing user programs. This innovative, patent-pending solution guarantees bulletpr ... Read More...
Visualizer
0 reviewsVisualizer is an advanced data warehouse solution that allows IT managers to graphically analyze security related system activity quickly and easily. Visualizer uses Business Intelligence techniques to process large quantities of transaction data with min ... Read More...
iSecurity
0 reviewsThe iSecurity suite of products for the System i is the most comprehensive & user-friendly security solution on the market. iSecurity includes 4 unique, patent-pending products and is designed to provide the ultimate support for compliance regulations suc ... Read More...
Capture
0 reviewsCapture captures and saves user screens in real-time, as well as preserving job logs and CL program command logs for review. The captures are automatically triggered according to a variety of criteria, such as IP address, user ID and time of day. Captur ... Read More...
Native Object Security
0 reviewswww.razlee.com/products/security/native_object_security_o.ph
The challenge of securing native OS/400 objects is the basis for Power i security due to the unique object-based architecture of the operating system and the fact that user-rights for accessing objects are checked for all operations, whether batch, intera ... Read More...
User & System Value Replication
0 reviewswww.razlee.com/products/security/user_system_value_replicati
The recent trend of consolidating servers has led to the increasing prevalence of multi-system and multi-LPAR shops. Companies have found it mandatory that system administrators and users alike synchronize user profile definitions, user passwords and syst ... Read More...
LATEST COMMENTS
MC Press Online