Skip to main content
TrustRadius
iSecurity

iSecurity

Overview

What is iSecurity?

The iSecurity Suite, developed by Raz-Lee Security, is a cybersecurity and compliance solution specifically designed for IBM i servers (AS/400). It offers a range of features and tools aimed at helping companies secure their IBM i servers and business-critical databases. The product is utilized by IT...

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Network Security Software

Be the first one in your network to review iSecurity, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

Sorry, this product's description is unavailable

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

Alternatives Pricing

What is Hyper Private Access?

HPA is a Business VPN, or Virtual Private Network, presented as a secret, safe tunnel on the internet that companies can use to keep their online stuff private and secure.

What is ExtraHop Reveal(x)?

ExtraHop now offers Reveal(x), the company's network traffic analysis (NTA) and anomaly detection security application.

Return to navigation

Product Details

What is iSecurity?

The iSecurity Suite, developed by Raz-Lee Security, is a cybersecurity and compliance solution specifically designed for IBM i servers (AS/400). It offers a range of features and tools aimed at helping companies secure their IBM i servers and business-critical databases. The product is utilized by IT professionals and administrators responsible for managing and securing IBM i servers, compliance officers, auditors, as well as professionals in finance, banking, healthcare, manufacturing, and distribution industries who rely on IBM i servers for their critical operations.

Key Features

iSecurity Auditing and Response: According to the vendor, the suite provides real-time monitoring and reporting solutions to meet IBM i auditing requirements. It offers user monitoring and control capabilities, sophisticated reporting, application data tracking, and streamlined server security audits.

Advanced Threat Protection: The suite integrates best-in-class Exit Point Monitoring, provides anti-virus protection for the IFS against malware, and offers command line access security.

Authentication & Authorization: The product supports Native Multi-Factor Authentication for secure sign-on, offers self-assisted password support through a web-based interface, and provides temporary extended authorization through Authority On Demand.

Encryption: The suite enables secure data at rest and data in transit with encryption solutions. It supports column-level field encryption based on IBM's FIELDPROC and utilizes private and public key technology for encrypting data files.

Protection: The suite includes a native firewall solution for controlling exit points, commands, and file updates. It regulates update files in production libraries for an added security layer and provides network security with control over exit points, open DBs, and SSH.

Evaluation, Reporting & Alerts: According to the vendor, the suite offers analysis and scoring of IBM i security definitions, summarization and analysis of user profiles, a single view for network-wide PCI compliance checks, and integration with SIEM & DAM solutions.

Database Solutions: The suite provides real-time monitoring of DB activity, including read operations. It offers standard native access to Oracle, MSSQL/MySQL from STRSQL, RPG, COBOL, and includes a SOX-enabled file editor with undo capability and log record of changes.

Compliance Solutions: The suite offers ready-made tools for PCI-DSS, SOX, GDPR, and HIPAA compliance. It enables compliance checks for multiple LPARS and integrates with SIEM & DAM solutions.

Command: The suite provides total control over system and user-defined CL commands. It allows for easy-to-define rules for reacting to specific CL command situations and enables analysis and modification of complex CL command parameters.

Antivirus: The suite offers comprehensive virus detection and protection for IBM i. It scans all accessed files and marks, quarantines, or deletes infected files. Regular updates of virus definitions are included.

iSecurity Features

  • Supported: Access Controls/Permissions
  • Supported: Intrusion Detection System
  • Supported: Reporting/Analytics
  • Supported: Vulnerability Scanning

iSecurity Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation