• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Raz-Lee Adds Object-Level Security to i OS Security Suite

    November 17, 2009 Alex Woodie

    Raz-Lee Security last week announced two new security modules for its i OS security suite. Native Object Security will allow i OS shops to implement object-level security on their systems without the hassle of manually configuring it through the operating system, while User Profile and System Value Replication will allow shops to easily replicate security settings across multiple servers or LPARs. The Israeli software company also made changes to other modules of its iSecurity suite, including its anti-virus software.

    iSecurity is a collection of about 17 products designed to automate the configuration and management of i OS servers, ranging from exit point control and analysis of i OS’s audit journal to virus scanning and password enforcement. Everything is accessed through an Eclipse-based graphical user console, called the iSecurity GUI, making Raz-Lee’s offering one of the most comprehensive and feature-rich security suites available to System i and Power Systems customers.

    The new Native Object Security module significantly boosts the capabilities of the iSecurity suite. The software aims to simplify the process of implementing object-level security, which is one of the most powerful security features of IBM i OS, i5/OS, and its predecessor operating systems.

    Raz-Lee’s software allows administrators to set up rules that define security levels for specific objects or groups of objects of a specific type. It gives administrators power to define variables such as the object’s owner, its authorization lists, what group it’s part of, and whether there are any specific user authorities associated with the object.

    Native Object Security also includes reporting features, and allows users to check for inconsistencies between actual and planned object security settings. This should be a very helpful feature for i OS administrators who are implementing object-level security for the first time, and may have overlooked something in the process.

    It can be difficult to implement object-level security, which is one of the biggest reasons why many shops avoid setting it up in the first place. Getting something wrong in object-level security–which prevents all forms of access to objects unless they are specifically granted (or the user has a special authority, such as ALLOBJ, which overrules object-level security)–can render a previously stable machine inaccessible to regular users.

    IBM tried to address the difficulty of implementing object-level security with a tool called Secure Perspectives. However, IBM basically killed the product earlier this year (although it is still available through IBM Systems Lab Services). One must assume that a lack of interest in the product had a hand in its short, two-year lifetime.

    In developing Native Object Security, Raz-Lee attempted to maximize flexibility and the number of configuration options, according to Eli Spitz, vice president of business development for Raz-Lee. “Accordingly, iSecurity supports both general and specific security settings, be it individual security levels for each and every object, or special temporary authorities for emergency cases,” he says in a press release. “This allows the security settings to reflect the customer’s exact needs, with little or no constraints.”

    Closely related to object-level security (in the i OS scheme of things) are user profiles and system values, and Raz-Lee’s new User Profile and System Value Replication module should make life easier for administrators at large shops.

    This new module is aimed at organizations that have multiple servers or multiple logical partitions (LPARs) that users need to access. It can be a chore to manually replicate all the user profile definitions, passwords, and system values among all the different systems and LPARs. Now, Raz-Lee’s new module does it for them.

    User Profile and System Value Replication allows administrators to create replication rules that govern the replication of profiles, passwords, and system values. From any system or LPAR in the environment, administrators can execute bulk updates of user profiles. They can also “revive” deleted user profiles, and choose system values that are based on “baseline” settings or “optimal” settings, depending on the specific environment.

    Raz-Lee also announced new features in several other iSecurity modules, including AP-Journal, Audit, Compliance Evaluator, Anti-Virus, and Authority on Demand. For more information, see www.raz-lee.com.

    RELATED STORIES

    IBM Kills Secure Perspectives Tool

    AIG-Israel Taps Raz-Lee for i OS Security Tool

    Raz-Lee Jazzes Up its iSecurity GUI

    Raz-Lee Summarizes i OS Security Settings in New Compliance Product

    Raz-Lee Eases Compliance with Update to iSecurity

    Raz-Lee Updates iSecurity Suite

    Raz-Lee Signs BOSaNOVA to Resell Security Software

    Raz-Lee Targets U.S. Market with iSeries Security Tools



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    ARCAD Software:  November 20 Webinar: Unify your multi-platform release management - with IOS
    Halcyon Software:  Simplify the monitoring of your ERP systems and HA solutions
    Manta Technologies:  Your complete source for IBM i training

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    Hewlett-Packard Eats 3Com for $2.7 Billion File Caching in RSE

    Leave a Reply Cancel reply

Volume 9, Number 42 -- November 17, 2009
THIS ISSUE SPONSORED BY:

Help/Systems
Vision Solutions
Linoma Software
Computer Keyes
East Coast Computer

Table of Contents

  • Security Vendors Take Aim at HITECH Act for Healthcare IT Overhaul
  • Raz-Lee Adds Object-Level Security to i OS Security Suite
  • i365 Plans Multi-Platform Backup and Recovery Based on Windows Server
  • Data Masking Tool from dataguise to Get DB2/400 Support
  • Kronos Unveils Software, New Sales Approach at Conference
  • Dimensional Insight Takes ‘The Diver’ BI Solution Up a Notch
  • Storagepipe Offers Online Backups for i OS, Too
  • Binary Tree Debuts E-Mail Migration Tool for Exchange 2010
  • DSI Data Collection Software Validated for EnterpriseOne 9.0
  • Vegas Casino Doesn’t Gamble with Software from Agilysys

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle