Leading IBM i security software vendor Raz-Lee announces major upgrade to iSecurity Firewall
Earlier this month, Raz-Lee announced a major software upgrade to its iSecurity Firewall product.
Shmuel Zailer, CEO, Raz-Lee Security commented on the upgrade:
“Technological advances over the years have compelled IBM to open IBM i systems to networks. This variety of interfaces and protocols results in new threats. Raz-Lee Security is committed to providing security solutions for the IBM i that will protect it from the ever-changing threats it encounters. We are seriously enhancing our product to provide new dimensions of convenience and agility.”
An all inclusive and comprehensive intrusion prevention system for the IBM i, iSecurity Firewall helps organisation to protect and secure every type of internal and external access to their IBM i server. Firewall enables IBM i based businesses to detect remote network access easily and, most importantly configure and implement real-time alerts.
The upgrade included three major enhancements:
Complete What-If system for IBM i security
Re-Calculate Logged Events
Users can now check their previous activity logs against rules that they have modified and see how these changes would influence the results. Results that would change are highlighted. This requires no previous preparation and can be used for any set of past events.
Simulate Firewall Events
Users can test the behaviour of the Firewall for any possible event. Enter any set of event parameters and see how Firewall would react to them. With this capability, users no longer have to create real events to test their rules.
Socket Exit Points
Socket Exit Points Enhanced
Control over socket exit points Accept, Connect and Listen has been enhanced. Socket Exit Points can help to conveniently control activities such as Email, TCP, UDP, Ports, and IP. Starting from this release, they will appear as standard exit points.
Free-style Rules in Socket Exit points
Socket Exit Points activity is controlled by Free-Style rules, providing ease of use.
Additional Type of Rule System
While the layered Firewall rule system suits most situations, there are some situations that one would find more convenient to protect without any predefined hierarchy of checks. With Free-style rules, every attribute of the event can be compared to a value. Comparisons also may test for Generic*, LIKE, LIST or check whether the value is an ITEM of an externally defined group. Tests can be combined using “And” and “Or”.
Enabled for ALL Exit Points
If they provide a result, the result overrides the other rules.
Also included in the release are:
Work with Database SQL Server Jobs
Firewall now enables users to conveniently inspect and control the activity of QZDASOINT jobs. These jobs serve database activity. Inspecting them is important when upgrading the product.
Skip Server Subcommands
Each server usually has several Subcommands, some of them are not important. Users can now eliminate checks for these. This helps isolate the needle from the haystack.
To learn more about iSecurity Firewall, request a demo today.