Screen
0 reviewsScreen is a terminal screen security product that protects unattended terminal screens, including PCs running terminal emulation software, from unauthorized use. Terminal abuse is difficult to prevent or detect because the transaction source cannot be rea ... Read More...
SSA for Compliance and Risk Management
0 reviewsAt SSA Global, we have the tools and technologies that can help enable compliance today and enjoy broad business benefits and a return on compliance investments, while building a sustainable compliance framework for the future.
SSA Sales Force Automation
0 reviewsSSA Sales Force Automation (SFA) has the tools to manage the entire sales cycle: lead routing and prioritization, contact management, opportunity and pipeline management, call scripting, and mobile access.
User & System Value Replication
0 reviewswww.razlee.com/products/security/user_system_value_replicati
The recent trend of consolidating servers has led to the increasing prevalence of multi-system and multi-LPAR shops. Companies have found it mandatory that system administrators and users alike synchronize user profile definitions, user passwords and syst ... Read More...
View
0 reviewsView provides top-notch record and field-level security by restricting access to specific fields and records in System i databases. View does not require recompilation of existing user programs. This innovative, patent-pending solution guarantees bulletpr ... Read More...
VISUAL Security Suite
0 reviewsProtect your sensitive data, consolidate the management of IT security across platforms and comply with security best practices and audit-related regulations, including SOX, HIPAA, SB 1386, FDA’s 21 CFR Part 11, the Basel II Accord and European privacy la ... Read More...
VISUAL Support Pro
0 reviewsInspect any iSeries job and displays otherwise inaccessible internal job information. Problems in batch or interactive jobs can be researched and diagnosed.
Visualizer
0 reviewsVisualizer is an advanced data warehouse solution that allows IT managers to graphically analyze security related system activity quickly and easily. Visualizer uses Business Intelligence techniques to process large quantities of transaction data with min ... Read More...