Upload
simon-norman
View
219
Download
0
Tags:
Embed Size (px)
Citation preview
Raz-Lee SecurityiSecurity for iSeries
2
Facts about Raz-LeeFacts about Raz-Lee
Internationally renowned iSeries solutions provider
Founded in 1983
100% focused on the AS/400 – iSeries
More than 20 unique iSeries products
Since 2000: Develop, Market & Support Security Products
More than 12,000 licenses worldwide
Worldwide Distribution Network
3
iSecurity Customers iSecurity Customers (partial list)(partial list)
4
Our Global Distribution NetworkOur Global Distribution Network
5
Product SuitesProduct Suites
Market positioning to present logical product sets to various market segments and applications
Silver• Geared to SMB and similar installations without a System Administrator• Easily maintained by user staff
Gold• Geared to mainstream iSeries market• Includes tools useful to System Administrator in a corporate or larger business
environment
Platinum• Includes all of iSecurity Gold plus Anti-Virus
All modules also sold individually
6
Product Suites - CompositionProduct Suites - Composition
ModuleSilverGoldPlatinumIndividuallyGUI
User Management
Password Manager
Screen
Capture
Visualizer
Firewall
Anti-Virus
System Control
iSecurity Assessment
View
Journal
Audit
Action
7
iSecurity Benefits & AdvantagesiSecurity Benefits & Advantages
Modular yet integrated end-to-end iSeries security solution provides total security protection
Many products are unique, with little or not competition!
Top Down Architecture & Best Fit Algorithm: Exceptional performance in large enterprises
Easy to use: Superior human engineering and native and GUI Interfaces
Major Selling Points:
8
iSecurity - Products OverviewiSecurity - Products Overview
Comprehensive, end-to-end Security for the iSeries…
9
iSecurity - Products OverviewiSecurity - Products Overview
…with reporting feedback loops!
10
Application ScenariosApplication Scenarios
Following is a series of application scenarios that provide examples of iSecurity product usage.
1- Excel access to IFS storage2- Secure FTP Access3- Secure Client Access
Exit Application Scenarios
11
Excel from IFS- 1/3Excel from IFS- 1/3
Use Windows Copy/Paste to successfully access iSeries IFS storage
12
Excel from IFS- 2/3Excel from IFS- 2/3
Screens for setting Allow/Reject access to specified servers, including support for filtering verbs
13
Excel from IFS- 3/3Excel from IFS- 3/3
When rejected, this message will appear. Not authorized to use Excel OR
not authorized to access the file OR not authorized to initiate the type of operation
attempted!
14
Use FTP to create a library, delete a library and power down the system!
Or, read a file, update it, and write the file back, all using FTP.
Secure FTP Access- 1/2Secure FTP Access- 1/2
15
Secure FTP Access- 2/2Secure FTP Access- 2/2
16
Secure Client Access- 1/3Secure Client Access- 1/3
17
Secure Client Access- 2/3Secure Client Access- 2/3
18
Secure Client Access- 3/3Secure Client Access- 3/3
19
“… (We) implemented the iSecurity modules in order to hermetically close off all security-related exposure in our iSeries systems. Besides offering us maximum protection and flexibility, iSecurity also provides reports used by our systems managers and auditors to assure full compliance with government regulations…
We heartily recommend the iSecurity products to other companies.”
Avishai Shliwkovitz, Director of Operations & Infrastructure, Leumit Health Fund
What iSecurity Customers Say What iSecurity Customers Say (1)(1)
20
“… We are using the iSecurity modules in a number of ways. First of all, Firewall addresses our requirements for a flexible, easily configurable network access product which addresses all security-related exit points in our computer. The Audit and Action modules work together to catch potential security exposures in real-time and to automate responses to these exposure by sending SMS messages and e-mails to relevant personnel at our shop.
We appreciate the efforts of Raz-Lee Security’s support staff which is able to solve any issues which arise in an expeditious and professional manner. .”
Rami Perry, IT Manager, The Israel Act Pool
What iSecurity Customers Say What iSecurity Customers Say (2)(2)
21
End-to-End iSeries SecurityEnd-to-End iSeries Security
Thank You!