This major release of iSecurity includes new functionality such as:
- Revolutionary Java-based GUI functionality including an embedded terminal emulator and embedded Excel-like spreadsheet for viewing reports run on the System i
- Solutions to auditor's and System Administrator's requests for "one-stop" reporting in multi-server environments. Reports can be executed and printed either on remote systems or locally and can easily be executed for groups of servers as well.
- The capability to produce- and e-mail!- reports in multiple formats (CSV, PDF, HTML)
- User Authentication which allows users to independently manage their own passwords without the assistance of System Administrators or Help Desk personnel. User Authentication ensures that users are who they portend to be, by implementing a system which asks users to answer personal, self-defined questions and provides the user with a secure, temporary password known only to the user.
Shmuel Zailer, CEO of Raz-Lee Security said: "This major release of iSecurity includes features requested by customers and prospects in a number of key areas. iSecurity now has more capabilities and addresses more security and compliance-related areas in and around the System i, such as user, screen, system, data base and system audit journal management to name just a few, than any other product on the market. Together with our distributors in the United States and throughout the world, we look forward to providing our current customer base as well as our future customers with the best in System i security."
About Raz-Lee Security Inc.
With corporate headquarters in Nanuet, New York, Raz-Lee Security is the leading security solution provider for the IBM System i (AS/400). Drawing upon over 24 years of standard and mission-critical installation experience, Raz-Lee has leveraged vast expertise in the System i Performance and Optimization Market to design, develop and market comprehensive security solutions. The broad scope of this experience gives Raz-Lee the insight required to develop, deploy and maintain products and solutions to assure end-to-end security for every System i configuration and application, the company says.
LATEST COMMENTS
MC Press Online