raz-lee security isecurity for iseries. 2 facts about raz-lee internationally renowned iseries...
TRANSCRIPT
![Page 1: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/1.jpg)
Raz-Lee SecurityiSecurity for iSeries
![Page 2: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/2.jpg)
2
Facts about Raz-LeeFacts about Raz-Lee
Internationally renowned iSeries solutions provider
Founded in 1983
100% focused on the AS/400 – iSeries
More than 20 unique iSeries products
Since 2000: Develop, Market & Support Security Products
More than 12,000 licenses worldwide
Worldwide Distribution Network
![Page 3: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/3.jpg)
3
iSecurity Customers iSecurity Customers (partial list)(partial list)
![Page 4: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/4.jpg)
4
Our Global Distribution NetworkOur Global Distribution Network
![Page 5: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/5.jpg)
5
Product SuitesProduct Suites
Market positioning to present logical product sets to various market segments and applications
Silver• Geared to SMB and similar installations without a System Administrator• Easily maintained by user staff
Gold• Geared to mainstream iSeries market• Includes tools useful to System Administrator in a corporate or larger business
environment
Platinum• Includes all of iSecurity Gold plus Anti-Virus
All modules also sold individually
![Page 6: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/6.jpg)
6
Product Suites - CompositionProduct Suites - Composition
ModuleSilverGoldPlatinumIndividuallyGUI
User Management
Password Manager
Screen
Capture
Visualizer
Firewall
Anti-Virus
System Control
iSecurity Assessment
View
Journal
Audit
Action
![Page 7: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/7.jpg)
7
iSecurity Benefits & AdvantagesiSecurity Benefits & Advantages
Modular yet integrated end-to-end iSeries security solution provides total security protection
Many products are unique, with little or not competition!
Top Down Architecture & Best Fit Algorithm: Exceptional performance in large enterprises
Easy to use: Superior human engineering and native and GUI Interfaces
Major Selling Points:
![Page 8: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/8.jpg)
8
iSecurity - Products OverviewiSecurity - Products Overview
Comprehensive, end-to-end Security for the iSeries…
![Page 9: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/9.jpg)
9
iSecurity - Products OverviewiSecurity - Products Overview
…with reporting feedback loops!
![Page 10: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/10.jpg)
10
Application ScenariosApplication Scenarios
Following is a series of application scenarios that provide examples of iSecurity product usage.
1- Excel access to IFS storage2- Secure FTP Access3- Secure Client Access
Exit Application Scenarios
![Page 11: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/11.jpg)
11
Excel from IFS- 1/3Excel from IFS- 1/3
Use Windows Copy/Paste to successfully access iSeries IFS storage
![Page 12: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/12.jpg)
12
Excel from IFS- 2/3Excel from IFS- 2/3
Screens for setting Allow/Reject access to specified servers, including support for filtering verbs
![Page 13: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/13.jpg)
13
Excel from IFS- 3/3Excel from IFS- 3/3
When rejected, this message will appear. Not authorized to use Excel OR
not authorized to access the file OR not authorized to initiate the type of operation
attempted!
![Page 14: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/14.jpg)
14
Use FTP to create a library, delete a library and power down the system!
Or, read a file, update it, and write the file back, all using FTP.
Secure FTP Access- 1/2Secure FTP Access- 1/2
![Page 15: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/15.jpg)
15
Secure FTP Access- 2/2Secure FTP Access- 2/2
![Page 16: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/16.jpg)
16
Secure Client Access- 1/3Secure Client Access- 1/3
![Page 17: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/17.jpg)
17
Secure Client Access- 2/3Secure Client Access- 2/3
![Page 18: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/18.jpg)
18
Secure Client Access- 3/3Secure Client Access- 3/3
![Page 19: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/19.jpg)
19
“… (We) implemented the iSecurity modules in order to hermetically close off all security-related exposure in our iSeries systems. Besides offering us maximum protection and flexibility, iSecurity also provides reports used by our systems managers and auditors to assure full compliance with government regulations…
We heartily recommend the iSecurity products to other companies.”
Avishai Shliwkovitz, Director of Operations & Infrastructure, Leumit Health Fund
What iSecurity Customers Say What iSecurity Customers Say (1)(1)
![Page 20: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/20.jpg)
20
“… We are using the iSecurity modules in a number of ways. First of all, Firewall addresses our requirements for a flexible, easily configurable network access product which addresses all security-related exit points in our computer. The Audit and Action modules work together to catch potential security exposures in real-time and to automate responses to these exposure by sending SMS messages and e-mails to relevant personnel at our shop.
We appreciate the efforts of Raz-Lee Security’s support staff which is able to solve any issues which arise in an expeditious and professional manner. .”
Rami Perry, IT Manager, The Israel Act Pool
What iSecurity Customers Say What iSecurity Customers Say (2)(2)
![Page 21: Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee Internationally renowned iSeries solutions provider Founded in 1983 100% focused on](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649dd25503460f94ac8ec4/html5/thumbnails/21.jpg)
21
End-to-End iSeries SecurityEnd-to-End iSeries Security
Thank You!