
Raz-Lee Security is a leading independent provider of cybersecurity and compliance solutions for IBM i servers (AS/400). The company specializes in real-time security auditing, anti-ransomware, antivirus, firewall, and multi-factor authentication, ensuring robust protection and compliance with regulations like SOX, HIPAA, and the California Privacy Act.
Vendor
Raz-Lee
Company Website
- iSecurity Action
iSecurity Action offers a comprehensive solution for real-time security monitoring and automated responses. It detects and responds to security events, ensuring compliance and protection for financial entities
- iSecurity Anti-Ransomware
iSecurity Anti-Ransomware quickly detects and isolates high-volume cyber threats on IBM i servers. It prevents ransomware from damaging valuable data while maintaining system performance.
- iSecurity Antivirus
iSecurity Antivirus provides comprehensive protection for IBM i servers against viruses, Trojan horses, and malicious code. It scans all accessed files, marks, quarantines, and deletes infected files, ensuring the system remains secure and compliant.
- iSecurity Antivirus for AIX
iSecurity Antivirus for AIX scans all accessed files, offering comprehensive virus detection by marking, quarantining, and deleting infected files. It prevents AIX servers from becoming infection sources while maintaining system performance.
- iSecurity Antivirus ICAP Client
iSecurity Antivirus ICAP Client enhances virus scanning on IBM i servers by offloading CPU-intensive tasks to external ICAP servers. This ensures faster scan times and maintains system performance while providing robust protection against malicious activities.
- iSecurity AP-Journal
iSecurity AP-Journal logs database access directly into journal receivers, providing a timeline report of all changes to application data. It issues real-time alerts for unauthorized activity, ensuring compliance with regulations like PCI, SOX, and HIPAA.
- iSecurity Audit
iSecurity Audit enhances IBM i auditing by monitoring and reporting on all activities in real time. It triggers alerts to potential threats and provides a user-friendly interface for managing system values and parameters. This tool ensures compliance with regulations like SOX, HIPAA, and the California Privacy Act.
- iSecurity Authority Inspector
iSecurity Authority Inspector helps minimize threats by analyzing and comparing utilized versus required authorities on IBM i servers. It provides graphical analysis, supports authority collection commands, and assists in maintaining security best practices.
- iSecurity Authority On Demand
iSecurity Authority On Demand simplifies the process of granting special authorities temporarily on IBM i servers. It enforces segregation of duties, protects sensitive assets, and reduces the number of profiles with powerful authorities.
- iSecurity Capture
iSecurity Capture provides a visual audit trail of user activity on IBM i servers. It automatically captures and saves screen activity, enabling real-time auditing and compliance for financial entities.