Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

iSecurity Audit significantly improves the native auditing capabilities of IBM i by continuously monitoring and reporting on all activities within the IBM i environment. Utilizing real-time detection, it identifies security events instantly and logs the relevant details for future reference. The audit logs can be presented in user-friendly graphical formats, complemented by clear explanations for each entry, facilitating quick analysis of statistical data. A key feature of this system is its ability to trigger alerts or initiate immediate corrective measures in response to security threats. Uniquely designed for non-technical users, such as external auditors and managers, iSecurity Audit stands out as the sole security auditing solution for IBM i created with user-friendliness in mind. In addition, this advanced security auditing tool not only monitors real-time events but also activates alerts and responses to potential vulnerabilities, making it an indispensable resource. Furthermore, it boasts a robust report generator equipped with over one hundred customizable, pre-configured reports, ensuring comprehensive coverage of security auditing needs.

Description

iSecurity Firewall serves as a robust and comprehensive intrusion prevention system that safeguards all forms of internal and external access to the IBM i server. It allows for the effortless identification of remote network access and crucially provides real-time alert capabilities. The firewall efficiently manages user profile statuses, secures entry through established entry points, and oversees exit points for the IBM i file server, while also profiling activities based on time. Its streamlined "top-down" functional design and user-friendly logic enable even those new to iSeries to become proficient within minutes. Furthermore, it protects all communication protocols, including SQL, ODBC, FTP, Telnet, SSH, and Pass-through. With an advanced Intrusion Prevention System (IPS), it offers immediate detection of unauthorized access attempts. Unlike conventional firewall solutions, it precisely dictates the actions users can take once access is granted, thereby enhancing security. Additionally, it secures both native and IFS objects, ensuring that all your databases remain protected from potential threats. This multifaceted approach to security makes iSecurity Firewall an indispensable tool for maintaining the integrity and safety of your digital environment.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

IBM i
ALIP
Accenture Cloud Trade Promotion Management
IBM Cloud
Meridian Global LMS
Proximity Insight
Trellix Data Encryption

Integrations

IBM i
ALIP
Accenture Cloud Trade Promotion Management
IBM Cloud
Meridian Global LMS
Proximity Insight
Trellix Data Encryption

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Raz-Lee Security

Founded

1983

Country

United States

Website

www.razlee.com/ibmi-audit-report/

Vendor Details

Company Name

Raz-Lee Security

Founded

1983

Country

United States

Website

www.razlee.com/firewall/

Product Features

Product Features

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Alternatives

CPTRAX for Windows Reviews

CPTRAX for Windows

Visual Click Software

Alternatives

Imunify360 Reviews

Imunify360

CloudLinux, Inc.
iSecurity Firewall Reviews

iSecurity Firewall

Raz-Lee Security
iSecurity AP-Journal Reviews

iSecurity AP-Journal

Raz-Lee Security
Corner Bowl Server Manager Reviews

Corner Bowl Server Manager

Corner Bowl Software Corporation