Depending on your business needs, iSecurity products from Raz-Lee can be used on your IBM i for preventing malicious external attacks, protecting critical applications, mitigating internal threats; or meeting ever more stringent auditing and compliance requirements.
But, just what are the benefits to your organisation of these products? Here we look at a number of different products in the suite and look at how they can deliver real business benefit and competitive advantage.
If you have any questions, or require further information on the benefits of any of our products, why not contact us?
AP-Journal Business Analysis
AP-Journal protects your organisation’ business-critical information on the IBM i from both internal and external security breaches. It will notify managers if there have been any changes to data and helps to streamline IBM i journaling procedures. AP-Journal provides you with the following benefits:
- Assure your organisation’s customers- and your auditors that unreasonable changes made to business-critical data fields are closely monitored and reported in real-time to responsible corporate personnel
- Assure your both organisation’s customers and your auditors that critical data is viewed only by people in the organisation who are authorised to view such data.
AP-Journal also extends the functionality of your organisation’s existing applications without any programming. For example, a mortgage company can offer customers who received a mortgage from them with historical timeline change reports with all the changes made to their mortgage terms over time (guarantors, based upon cross-database business items such as mortgage number, customer number, loan number, etc).
In another scenario, a medical supplies warehouse could set up an “early warning system” so that when the number of items of a certain product remaining in the warehouse falls below a pre-defined threshold, an email is automatically sent to the people responsible for ordering additional supplies.
Audit
Audit provides a real-time, integrated view of all audit journal files and security-related events for simple, graphical display of QAUDJRN auditing, monitoring and reporting for IBM i. Audit gives your organisation the following benefits:
- Enable internal and external auditors to be self-sufficient in producing their own reports
- Hundreds of pre-defined, but easily customisable audit reports
- Simplify analysis of system activities by displaying system log information in an easy-to-understand format
- Pinpoint suspected breaches of system security within seconds
- Generate real-time alerts to relevant management personnel when specific system activities occur
- Feed corporate SIEM and DAM products with IBM i security related information in real-time.
Firewall
If you are looking for a comprehensive, all-inclusive intrusion prevention system for both internal and external access to your IBM I, which covers all exit points, then Firewall is the answer. Firewall can provide your organisation with the following business benefits:
- Protect your systems from being hacked
- Pinpoint hacking attempts, whether they succeed or fail
- Generate real-time alerts when suspected hacking attempts occur and send these alerts to the corporate SIEM product.
Authority on Demand
Being able to provide flexible control over user authorities and application data and process access can be problematic for IBM i system audits. Authority on Demand gives you the ability to:
- Monitor activities of employees and outside consultants, auditors, etc., obtaining a full audit trail of their activities including screenshots, commands issued, objects accessed, field updates performed, etc.
- Allocate high authorities only as needed and when needed, and get automatic verifications of authority requests, the reason for the high authority request, who requested, from which IP address, for what purposes, etc.
Capture
Capture does exactly that. It gives you the ability to record and playback 5250 green screen user sessions on the IBM i – either overtly or covertly. This delivers the following business benefits:
- Fully adhere to legislation that requires a record of all IT activities be kept online for a number of years
- Be able to provide courts and law enforcement agencies with “hard”, indisputable evidence relating to illegal IT activities
- Significantly lower the prevalence of malicious activities by pre-warning your users that their activity during sessions may be recorded.
Change Tracker
Without requiring input from the user, Change Tracker tracks the changes made in production libraries and IFS at both object and source levels. This provides the following benefits:
- Ensure that your organisation’s Change Management System is not being circumvented
- Coordinate object and source changes
- Monitor changes to objects in application specific libraries.
Password Reset
Password Reset can give your organisation the following business benefits:
- Offload user password related responsibilities from your system administrators and help desk
- Maximise security of user passwords
- Verify that passwords are being reset only by the true owners of the user profile.
Posted by Paul on 15th January 2015.