Informing the IBM Community

Major Software Upgrade for iSecurity Firewall


Nanuet, New York – September 15, 2019 – Raz-Lee Security announces a major software upgrade for the iSecurity Firewall. The upgrade includes these major enhancements:

Complete What-If system

• Re-Calculate Logged Events – Now you can check your previous activity logs against rules that you have modified and see how these changes would influence the results. Results that would change are highlighted. This requires no previous preparation and can be used for any set of past events.
• Simulate Firewall Events – Now you can test the behavior of the Firewall for any possible event. Enter any set of event parameters and see how Firewall would react to them. With this capability, you no longer have to create real events to test your rules.

Socket Exit Points

Socket Exit Points Enhanced – Control over socket exit points Accept, Connect and Listen has been enhanced. Socket Exit Points can help to conveniently control activities such as Email, TCP, UDP, Ports, and IP. Starting from this release, they will appear as standard exit points.
• Free-style Rules in Socket Exit points –Socket Exit Points activity is controlled by Free-Style rules, providing ease of use.

Free-style Rules

Additional Type of Rule System – While the layered Firewall rule system suits most situations, there are some situations that one would find more convenient to protect without any predefined hierarchy of checks. With Free-style rules, every attribute of the event can be compared to a value. Comparisons also may test for Generic*, LIKE, LIST or check whether the value is an ITEM of an externally defined group. Tests can be combined using “And” and “Or”.
• Enabled for ALL Exit Points – If they provide a result, the result overrides the other rules.

Something more…

Work with Database SQL Server Jobs – Firewall now enables you to conveniently inspect and control the activity of QZDASOINT jobs. These jobs serve database activity. Inspecting them is important when upgrading the product.
• Skip Server Subcommands – Each server usually has several Subcommands, some of
them are not important. You can now eliminate checks for these. This helps isolate
the needle from the haystack.
“Technological advances over the years have compelled IBM to open IBM i systems to networks.
This variety of interfaces and protocols results in new threats. Raz-Lee Security is committed to
providing security solutions for the IBM i that will protect it from the ever-changing threats it
encounters. We are seriously enhancing our product to provide new dimensions of convenience
and agility,” says Shmuel Zailer, CEO, Raz-Lee Security.
iSecurity Firewall 18.08 is now available and can be purchased from our certified business partners.


About Raz-Lee Security Inc. and iSecurity
Raz-Lee Security, headquartered in Nanuet, New York, is a leading independent cybersecurity
and compliance solutions provider for IBM’s IBM i (AS/400) midrange computers. With more
than 30 years of expertise and customers in over 40 countries, Raz-Lee’s flagship iSecurity™
suite guards organizations against insider threat and unauthorized external access to businesscritical
information hosted on their IBM i. The company continues to develop and market
cutting-edge solutions that have revolutionized analysis and fortification of IBM i servers.
Follow Raz-Lee Security
For further information please contact:
Anjel Sadiky
Marketing Manager
Tel: 1-888-729-5334

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.


Leave a Reply

Your email address will not be published. Required fields are marked *