• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Raz-Lee Adds Self-Auditing Feature to Security Products

    November 4, 2015 Alex Woodie

    “Who polices the police?” That’s the question many CIOs are asking as they clamp down on potential security exposures in response to increasingly strict regulations. Now Raz-Lee Security is working to reduce the suspicion surrounding IBM i system administrators (i.e., the server cops) by building self-auditing capabilities directly into its security tools.

    In many IBM i shops, the system administrator is typically the most powerful user on the system. This jack-of-all-trades is often called upon to do the work that would be covered by a security officer in bigger shops running open systems. It’s common to give the “keys to the kingdom,” as it were, to the sys admin, and to trust him with critical security roles, such as controlling authority, access, authentication, and auditing for all users on the system.

    Putting all this power into the hands of a single person raises legitimate security concerns. Business owners are asked to entrust the sanctity of their data and their livelihoods to a single administrator with god-like powers on the IBM i. What if the admin goes rogue? How would you be able to tell?

    The folks at Raz-Lee understand the dilemma. Security tools such as its iSecurity Suite can cut both ways. In addition to giving the administrators powerful tools to spot malfeasance by internal and external users, they also give admins the capability to potentially cover up their own tracks.

    Now Raz-Lee is stepping up and clamping down on this potential weakness. Last month the company announced that it’s adding self-auditing capabilities for detecting any changes made to the product configuration and definition files for all of the products in its iSecurity Suite.

    The self-auditing features were developed by using the IBM i database journal to track any changes made to product configuration and definition files. The output of the database journal can be tough to interpret, so Raz-Lee has embedded its own journal reporting tool, called AP-Journal, to make it user friendly.

    Raz-Lee says this feature is unique on the market and addresses a potentially serious security exposure. “[A] system administrator with open and unrecorded access to a security product may freely change the product’s definitions to allow abusing the system without such breaches being detected by others, even by those who are administrating the product,” the company says.

    The changes come in response to user demands, says Eli Spitz, Raz-Lee’s vice president of business development.

    “Auditors at large customers worldwide have asked Raz-Lee to provide the capability to audit their own products’ definition changes,” he says. “Raz-Lee has now decided to provide exactly what customers are looking for: a free, robust, and out-of-the-box product feature.”

    iSecurity includes more than a dozen individual products, including:

    • Action, for identifying security breaches on IBM i
    • Anti-Virus, an IBM i implementation of open source ClamAV
    • AP-Journal Business Analysis, for internal security investigations using the audit journal
    • AP-Journal Regulation Compliance, for proving security compliance to external auditors
    • Assessment, a Windows-based security assessment tool for IBM i
    • Audit, providing comprehensive auditing and reporting for IBM i
    • Authority on Demand, allowing users to temporarily swap into powerful user profiles
    • Capture, for tracking user activity, including screen shots
    • Central Administration, providing centralized control of multi-server iSecurity implementations
    • Compliance Evaluator, for checking on the regulatory compliance posture of a system
    • Firewall, for protecting IBM i from network-born threats
    • Password, for managing passwords
    • Screen, a security-focused screensaver
    • System Control, for responding to system resource changes
    • Visualizer for Audit, a visualization tool for audits
    • Visualizer for Firewall, a visualization tool for the firewall

    Raz-Lee, which has offices in New York City and Israel, made the announcement at last month’s COMMON Fall Conference and Expo, which was held in Fort Lauderdale, Florida.

    RELATED STORIES

    Raz-Lee Makes Moves in UK and Latin America

    Raz-Lee Rolls Out Business-Item Capture Solution

    Raz-Lee Certifies IBM i Security Tools with McAfee

    Raz-Lee Supports IPv6 with IBM i Security Software

    Raz-Lee Delivers New IFS Object Security for IBM i

    McAfee Works with Raz-Lee to Monitor DB2 for i

    Raz-Lee Updates AP-Journal Fraud-Detection Tool

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Krengeltech

    When it comes to consuming web APIs on your IBM i, your options often boil down to one of two things:

    First, you end up having to rely on a variety of open source and non-RPG solutions. This adds developer complexity, taking away time that could have been better spent invested in other projects. Of course, open source software is free, but generally comes at the cost of no professional support, which adds an element of risk in your production environment. RXS is completely professionally supported, and is complemented by a staff of trained IBM i developers who can address your nuanced development challenges, head on.

    Second, if you choose not to pursue an open-source solution, you’re often left having to shake up your current program architecture with proprietary software, external dependencies, and partial RPG implementations – many of which are sub-par compared to RPG-XML Suite’s wide range of features. RXS aims to simplify the efforts of developers with tools like code generators, useful commands, and subprocedures written in 100% RPG – no Java. Because they are entirely RPG, the RXS subprocedures are easy to add to new or existing ILE programs and architecture, helping to cut your development time. RPG-XML Suite offers powerful capabilities in an accessible, easy-to-implement format.

    With RPG-XML Suite, you can accomplish a variety of complex tasks, such as:

    • Calling REST and SOAP web services from your IBM i
    • Offering APIs from your IBM i
    • Creating JSON & XML
    • Parsing JSON & XML
    • Text manipulation, Base64 encoding/decoding, CCSID handling, hashing and encryption functions, and more.

    To try RXS for yourself, we recommend a free proof of concept, which not only gives you access to all of RPG-XML Suite’s subprocedures and utilities but also includes a tailor-made software demonstration that can be used as a starting point for your future API implementations.

    For a free proof of concept, contact us at sales@krengeltech.com, or visit our website for more information.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    NGS:  Nov. 18 FREE Webinar: Migration Alternatives for Query/400 Users
    HelpSystems:  How do you use IBM i? Your peers want to know! Take the survey >
    BCD:  IBM i Webinar with Jon Paris - RPG OA: So Misunderstood! November 18 at 1pm EST

    Extracting Sample Data From A DB2 for i Table IBM i Development Team Considering Native .NET

    Leave a Reply Cancel reply

Volume 25, Number 56 -- November 4, 2015
THIS ISSUE SPONSORED BY:

New Generation Software
Rocket Software
BCD Software
Fresche Legacy
Storagepipe

Table of Contents

  • IBM i Executives: Where Are They Now?
  • Crossroads Drops Rack Requirement, Adds De-Dupe in VTL
  • Tango/04 Boosts IT-Business Alignment Capabilities
  • Komodo Launches Hosted Splunk Service for IBM i
  • Raz-Lee Adds Self-Auditing Feature to Security Products

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Guild Mortgage Takes The 20-Year Option For Modernization
  • IBM i Licensing, Part 3: Can The Hardware Bundle Be Cheaper Than A Smartphone?
  • Guru: The Finer Points of Exit Points
  • Big Blue Tweaks IBM i Pricing Ahead Of Subscription Model
  • We Still Want IBM i On The Impending Power E1050
  • DRV Brings More Automation to IBM i Message Monitoring
  • Managed Cloud Saves Money By Cutting System And People Overprovisioning
  • Multiple Security Vulnerabilities Patched on IBM i
  • Four Hundred Monitor, June 22
  • IBM i PTF Guide, Volume 24, Number 25

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.