Raz-Lee Security Announces Major Software Upgrade for iSecurity Firewall

Security News
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Raz-Lee Security announces a major software upgrade for the iSecurity Firewall. The upgrade includes these major enhancements:

Complete What-If system

  • Re-Calculate Logged Events – Now you can check your previous activity logs against rules that you have modified and see how these changes would influence the results. Results that would change are highlighted. This requires no previous preparation and can be used for any set of past events.
  • Simulate Firewall Events – Now you can test the behavior of the Firewall for any possible event. Enter any set of event parameters and see how Firewall would react to them. With this capability, you no longer have to create real events to test your rules.

Socket Exit Points

  • Socket Exit Points Enhanced – Control over socket exit points Accept, Connect and Listen has been enhanced. Socket Exit Points can help to conveniently control activities such as Email, TCP, UDP, Ports, and IP. Starting from this release, they will appear as standard exit points.
  • Free-style Rules in Socket Exit points –Socket Exit Points activity is controlled by Free-Style rules, providing ease of use.

Free-style Rules

  • Additional Type of Rule System – While the layered Firewall rule system suits most situations, there are some situations that one would find more convenient to protect without any predefined hierarchy of checks. With Free-style rules, every attribute of the event can be compared to a value. Comparisons also may test for Generic*, LIKE, LIST or check whether the value is an ITEM of an externally defined group. Tests can be combined using “And” and “Or”.
  • Enabled for ALL Exit Points – If they provide a result, the result overrides the other rules.

Something more…

  • Work with Database SQL Server Jobs – Firewall now enables you to conveniently inspect and control the activity of QZDASOINT jobs. These jobs serve database activity. Inspecting them is important when upgrading the product.
  • Skip Server Subcommands – Each server usually has several Subcommands, some of them are not important. You can now eliminate checks for these. This helps isolate the needle from the haystack.

“Technological advances over the years have compelled IBM to open IBM i systems to networks. This variety of interfaces and protocols results in new threats. Raz-Lee Security is committed to providing security solutions for the IBM i that will protect it from the ever-changing threats it encounters. We are seriously enhancing our product to provide new dimensions of convenience and agility,” says Shmuel Zailer, CEO, Raz-Lee Security.

iSecurity Firewall 18.08 is now available and can be purchased from our certified business partners.

Raz-Lee Security, with headquarters in Nanuet, New York, is a leading security solution provider for IBM's Power i (AS/400) computers. Drawing upon its 26 years of expertise in the Power i performance and optimization market, the company designs, develops, and markets a comprehensive suite of advanced security software solutions—iSecurity.

Raz-Lee's iSecurity product suite is field-proven and features three product sets: the Prevention pack, a complete security solution covering network access, user/password management, anti-virus protection, detection of harmful events, protection of workstations and more; the Compliance pack, which comprises auditing and compliance solutions, providing automatic reporting security related information; and the Application Security suite, which provides information on all changes in business-critical data using real-time alerts and timeline reports.

More Articles By This Author