• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Raz-Lee Signs BOSaNOVA to Resell Security Software

    April 17, 2007 Alex Woodie

    BOSaNOVA is getting the security bug. Once focused primarily on System i terminals and emulation, the company broke into the security business with the introduction of its Q3 data encryption appliance earlier this year. Now, BOSaNOVA is hooking up with Raz-Lee Security in a new partnership to sell Raz-Lee’s i5/OS security software, the companies announced last week.

    As part of the deal, BOSaNOVA will resell iSecurity, Raz-Lee’s suite of security software for i5/OS. iSecurity is composed of 13 related products providing network security, audits, antivirus, password management, user profile management, and security assessment capabilities, through green screens or a Java-based GUI.

    The iSecurity software and Q3 encryption hardware will be sold through BOSaNOVA’s new Security Solutions Group. The new group is headed up by security solutions director Mike Campbell, who, ironically, worked for a time at Raz-Lee, where he helped start its reseller channel. (Before that, the Dallas-based Campbell was with iTera, which is now Vision Solutions.) Raz-Lee, which is based in Herzliya, Israel, has U.S headquarters in Nanuet, New York, and has attracted more than a dozen partners over the last couple of years.

    “iSecurity is a high quality, comprehensive end-to-end security solution and this partnership is a perfect fit because both companies are committed to providing top-notch solutions and support for the System i community,” Campbell says.

    RELATED STORIES

    New BOSaNOVA Appliance Encrypts Tape Backups

    Raz-Lee Targets U.S. Market with iSeries Security Tools



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Midrange Dynamics North America

    Accelerate Change & Integration on IBM i

    Good change management unites IBM i and open systems development for productive collaboration. Developers work with their preferred tools and IDEs. Ultimate version control and traceability mean fast bug fixes and less stress. Rollback to a stable version in seconds.

    Change management gives managers, operations teams, and auditors the visibility they need, and developers can focus on what they like best: building great applications.

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Computer Keyes:  Rapidly convert *SCS printer files into black and white or full color PDF documents
    COMMON:  Join us at the 2007 conference, April 29 – May 3, in Anaheim, California
    VAULT400:  Securely archive data with Instant Back-Up & 24x7 Recovery

    IT Jungle Store Top Book Picks

    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket Developers' Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    iSeries Express Web Implementer's Guide: List Price, $59.00
    Getting Started with WebSphere Development Studio for iSeries: List Price, $79.95
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    WebFacing Application Design and Development Guide: List Price, $55.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    The All-Everything Machine: List Price, $29.95
    Chip Wars: List Price, $29.95

    Virtualization Can Hurt Security, Gartner Says Calling SQL Functions Directly From a High Level Language Program

    Leave a Reply Cancel reply

Volume 7, Number 15 -- April 17, 2007
THIS ISSUE SPONSORED BY:

LANSA
Aldon
COMMON
Computer Keyes
Twin Data

Table of Contents

  • Global Hires Beer, Rolls Out New Web Site
  • Oracle Declares a ‘Renaissance’ for J.D. Edwards World
  • Shield Launches ‘DR for the Masses’
  • IBM Addresses Object-Level Security with New Tool
  • More Details Emerge on Query/400’s Java-Based Replacement
  • LogLogic 4.0: A View to a Log
  • Raz-Lee Signs BOSaNOVA to Resell Security Software
  • Ericom Supports Windows Vista with PowerTerm WebConnect
  • EXTOL’s New ‘EDI Appliance’ Based on System i Express Model 515
  • SOAs Are Being Implemented at Large Companies, Evans Data Says

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • To Comfort The Afflicted And Afflict The Comfortable
  • How FalconStor Is Reinventing Itself, And Why IBM Noticed
  • Guru: When Procedure Driven RPG Really Works
  • Vendors Fill In The Gaps With IBM’s New MFA Solution
  • IBM i PTF Guide, Volume 27, Number 27
  • With Power11, Power Systems “Go To Eleven”
  • With Subscription Price, IBM i P20 And P30 Tiers Get Bigger Bundles
  • Izzi Buys CNX, Eyes Valence Port To System Z
  • IBM i Shops “Attacking” Security Concerns, Study Shows
  • IBM i PTF Guide, Volume 27, Number 26

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle