Eli Spitz
Action
0 reviewsAction is a powerful security solution that intercepts security breaches and other events in real-time and immediately takes appropriate corrective action. Actions may include sending e-mails and alert messages to key personnel and/or running command scri ... Read More...
Assessment
0 reviewsAssessment, part of the iSecurity suite, enables you to test your System i security vulnerability within minutes. Assessment checks your ports, sign-on attributes, user privileges, passwords, terminals, and more. Results are provided instantly, with score ... Read More...
Audit
0 reviewsAudit is a state-of-the-art security auditing application that examines events in real time, and triggers alerts and other responsive actions to potential threats. It contains a powerful report generator with over one hundred pre-defined reports. Audit is ... Read More...
Capture
0 reviewsCapture captures and saves user screens in real-time, as well as preserving job logs and CL program command logs for review. The captures are automatically triggered according to a variety of criteria, such as IP address, user ID and time of day. Captur ... Read More...
FileScope
0 reviewsFileScope is recognized by System i professionals the world over as the leading product in the area of data manipulation. FileScope provides unprecedented file editing capabilities, while adhering to the highest standards of quality, reliability and perfo ... Read More...
Firewall
0 reviewsFirewall protects and secures all types of access, to and from the System i, within or outside the organization, under all types of communication protocols. This robust, cost-effective security solution is by far the most intuitive and easy-to-use securit ... Read More...
iSecurity
0 reviewsThe iSecurity suite of products for the System i is the most comprehensive & user-friendly security solution on the market. iSecurity includes 4 unique, patent-pending products and is designed to provide the ultimate support for compliance regulations suc ... Read More...
Journal
0 reviewsJournal automatically manages database changes by documenting and reporting exceptions made to the database journal. This unique security and organizational solution provides expert field-tracking and monitoring. Journal is a valuable tool for Sarbanes-Ox ... Read More...
Password
0 reviewsPassword is a general-purpose password management product that ensures user passwords cannot be easily guessed or cracked. The product includes the capability of integrating site-specific dictionaries defining illegal passwords. As the first line of defen ... Read More...
Raz-Lee Security, Inc.
0 reviewsRaz-Lee Security is the leading security solution provider for IBM Power i, otherwise known as iSeries or AS/400 servers. With over 25 years of exclusive iSeries security focus, Raz-Lee has achieved outstanding development capabilities and expertise ... Read More...
Screen
0 reviewsScreen is a terminal screen security product that protects unattended terminal screens, including PCs running terminal emulation software, from unauthorized use. Terminal abuse is difficult to prevent or detect because the transaction source cannot be rea ... Read More...
View
0 reviewsView provides top-notch record and field-level security by restricting access to specific fields and records in System i databases. View does not require recompilation of existing user programs. This innovative, patent-pending solution guarantees bulletpr ... Read More...
Visualizer
0 reviewsVisualizer is an advanced data warehouse solution that allows IT managers to graphically analyze security related system activity quickly and easily. Visualizer uses Business Intelligence techniques to process large quantities of transaction data with min ... Read More...
LATEST COMMENTS
MC Press Online