Presentation on theme: "ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System."— Presentation transcript:
About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System i 3 product lines: iSecurity Infrastructure Security iSecurity Application Security Scope system tools: file editor, performance tuning Over 12,000 licenses worldwide Installed in over 30 countries worldwide Worldwide distribution network IBM Advanced Business Partner
Compliance Evaluator Visualizer Evaluation Protection Firewall Authority on Demand Anti-Virus Screen Password Action Native Object Security Databases AP-Journal View FileScope iSecurity Overview Assessment PCI, HIPAA, SOX or Security Breach or Management Decision 2 Auditing Audit Capture User Management System Control User Profile Replication System Value Replication Central Admin 3 4 5 7 6 8 1
Auditing (1) Audit – Tool for compliance with security regulation, including over 300 customizable reports in user- selected formats which can be automatically scheduled. Capture - Captures green screen user images, archives them offline, and enables searching screen sessions and playing back user sessions. User Management - Manages and monitors all user profile-related definitions.
Auditing (2) System Control - Ensures increased availability of a site’s services via ongoing, overall control and tuning of resources. User Profile & Password Replication - Ensures that user profile information is consistent in multi-system & multi-LPAR environments. System Value Management & Replication - Ensures that system values are consistent in multi-system and multi-LPAR environments. System values can be set to optimal, baseline or specific values. Central Administration - manages multiple systems from a single control point.
Protection (1) Firewall - provides total protection from intrusions, viruses, and unauthorized uses – at all 53 iSeries security-related exit points. Supports IDS (Intrusion Detection System) alerts. Authority on Demand - Enforces segregation of duties and provides audit trail for special authority requests. Anti-Virus - Scans files and email attachments for PC viruses, and tracks unauthorized use of standard IBM APIs.
Protection (2) Screen - Personalized protection and security of unattended workstations, ensuring full network security server control. Password - Full password management including site-defined password policies and enforcement, GUI-based password related reports and extensive batch reporting. Action - an essential part of the IDS (Intrusion Detection System) that includes real-time alarms and protective response mechanisms. Native Object Security - Easily defines security levels per object and object type. Checks for inconsistencies between actual and planned settings.
Databases AP-Journal - Issues real-time threshold- activated alerts indicating changes in business-critical data. Generates cross- application reports displaying all database changes on a single timeline. View - Restricts access of unauthorized users to specific database records or to specific fields. Protects and controls display of classified data on screen Filescope - a data manipulation product which provides advanced file editing capabilities, adhering to the highest standards of quality, reliability and performance.
Evaluation Compliance Evaluator - quickly checks the compliance of System i with industry and corporate policies based on customizable user- friendly reports. Visualizer - a Business Intelligence System for display and analysis of data from the iSeries server (System i or AS/400).
iSecurity Product Index Prevention Pack Firewall Visualizer for Firewall Password Screen Assessment Compliance Pack Audit Visualizer for Audit Action System Control Assessment Application Security Suite AP-Journal Capture View Individual Products Compliance Evaluator Authority on Demand Native Object Security User Profile & System Value Replication Central Administration Anti-Virus