Raz-Lee Security


(888) 729-5334 x1

Web Site:


iSecurity Suite

iSecurity Suite is a comprehensive suite of advanced security solutions addressing major aspects of information security: network access security, cyber-security, application security, QAUDJRN monitoring and reporting, user profile management including special authorities and compliance with industry (e.g., GDPR, PCI DSS, SOX, HIPAA) and site-specific regulations mandated by auditors.

Security products provide complete end-to-end Intrusion Detection and Prevention for the IBM i. It helps companies meet their IBM i security and regulatory requirements by providing best-in-class exit point monitoring integration, anti-ransomware protection of the IFS for malware as well as command-line access security.

Auditing products help companies meet their IBM i auditing requirements by providing best-in-class monitoring and reporting solutions that best secure their business-critical databases. It supports capabilities such as user monitoring and control, sophisticated reporting and application data tracking–thereby streamlining server security audits.

Database products provide application security that preserves the integrity of business-critical information and productivity tools that allow for editing and data access capabilities for the IBM i.

iSecurity is fully operational in Eclipse-based GUI and green screen, and includes a unique business intelligence component for instantaneous analysis and investigation of security-related log data. iSecurity is field-proven in more than 35 countries and is supported by a global distribution network.

Key characteristics include:

  • Identical look and feel throughout all products.
  • One solution suite from a single vendor to address all security, auditing and compliance-related requirements.
  • Unique encryption and tokenization solution optimized for performance.
  • Appropriate for IBM i CIOs, security officers, auditors, system administrators, application managers and help desk personnel.
  • Addresses insider threats, external security risks and business-critical application data changes.
  • Integration partnerships with IBM Tivoli and QRadar, McAfee, RSA, HP, GFI, NNT. OEMed by Imperva. Integrates with ArcSight, Splunk, Juniper and others.
  • Full multi-LPAR support, integrated from inside the IBM i, provides system-wide reporting, scheduling and BI.
  • Site-definable compliance, full support for SOX, PCI DSS, HIPAA and specific requirements; checklists supplied.
  • Full Eclipse-based GUI shortens learning curve for non-IBM i personnel to interface with all products.
  • Robust report generator and scheduler with hundreds of prepackaged, modifiable reports and compliance checklists, sends Excel, HTML, PDF, CSV reports.
  • Sends real-time alerts with event-specific messages via email, SMS, Syslog, SNMP, Twitter, etc.; includes CL Script executor for remedial action.
  • Database application auditing detects real-time field-level changes and READ accesses.
  • Graphical business intelligence enables instantaneous analysis of network access, system journal and application data-related events.
  • Obtain detailed activity audit-trail for employees and non-employees including “hard” evidence, including session playback and search capabilities.

Learn More

[WEBINAR] iSecurity for IBM i by Raz-Lee Security