iSecurity Gold - Raz-Lee

Download Report

Transcript iSecurity Gold - Raz-Lee

Raz-Lee Security
iSecurity for iSeries
Facts about Raz-Lee

Internationally renowned iSeries solutions provider

Founded in 1983

100% focused on the AS/400 – iSeries

More than 20 unique iSeries products

Since 2000: Develop, Market & Support Security Products

More than 12,000 licenses worldwide

Worldwide Distribution Network
2
iSecurity Customers
(partial list)
3
Our Global Distribution Network
4
Product Suites
Market positioning to present logical product sets to various
market segments and applications

Silver
•
•

Gold
•
•

Geared to mainstream iSeries market
Includes tools useful to System Administrator in a corporate or larger business
environment
Platinum
•

Geared to SMB and similar installations without a System Administrator
Easily maintained by user staff
Includes all of iSecurity
Gold plus Anti-Virus
All modules also sold individually
5
Product Suites - Composition
Module
Silver
Gold
Platinum
Individually
GUI
User Management





Password Manager







Screen

Capture
Visualizer





Firewall















View


Journal

Anti-Virus
System Control
iSecurity Assessment
Audit
Action









6
iSecurity Benefits & Advantages
Major Selling Points:




Modular yet integrated end-to-end iSeries security
solution provides total security protection
Many products are unique, with little or not
competition!
Top Down Architecture & Best Fit Algorithm:
Exceptional performance in large enterprises
Easy to use: Superior human engineering and native
and GUI Interfaces
7
iSecurity - Products Overview
Comprehensive, end-to-end
Security for the iSeries…
8
iSecurity - Products Overview
…with reporting feedback loops!
9
Application Scenarios
Following is a series of application scenarios that
provide examples of iSecurity product usage.
1- Excel access to IFS storage
2- Secure FTP Access
3- Secure Client Access
Exit Application Scenarios
10
Excel from IFS- 1/3
Use Windows
Copy/Paste to successfully
access iSeries IFS storage
11
Excel from IFS- 2/3
Screens for setting Allow/Reject access to specified
servers, including support for filtering verbs
12
Excel from IFS- 3/3
When rejected, this message will appear.
Not authorized to use Excel OR
not authorized to access the file OR
not authorized to initiate the type of operation
attempted!
13
Secure FTP Access- 1/2
Use FTP to create a library, delete a library
and power down the system!
Or, read a file, update it, and
write the file back, all using FTP.
14
Secure FTP Access- 2/2
15
Secure Client Access- 1/3
16
Secure Client Access- 2/3
17
Secure Client Access- 3/3
18
What iSecurity Customers Say (1)
“… (We) implemented the iSecurity modules in order to hermetically
close off all security-related exposure in our iSeries systems.
Besides offering us maximum protection and flexibility, iSecurity also
provides reports used by our systems managers and auditors to
assure full compliance with government regulations…
We heartily recommend the iSecurity products to other companies.”
Avishai Shliwkovitz, Director of Operations & Infrastructure, Leumit Health Fund
19
What iSecurity Customers Say (2)
“… We are using the iSecurity modules in a number of ways. First of
all, Firewall addresses our requirements for a flexible, easily
configurable network access product which addresses all securityrelated exit points in our computer. The Audit and Action modules
work together to catch potential security exposures in real-time
and to automate responses to these exposure by sending SMS
messages and e-mails to relevant personnel at our shop.
We appreciate the efforts of Raz-Lee Security’s support staff which is
able to solve any issues which arise in an expeditious and
professional manner. .”
Rami Perry, IT Manager, The Israel Act Pool
20
End-to-End iSeries Security
Thank You!
21