Raz-Lee Achieves Both IBM Advanced Business Partner & IBM Power Systems Software Status

July 27, 2009

Raz-Lee Security has received IBM Power Systems Software Status, and has also reaffirmed its IBM Advanced Business Partner Status. These emblems reflect the close relationship between Raz-Lee and IBM.

According to IBM, “Advanced level Business Partners have committed to maintaining a prosperous business relationship with IBM and are recognized and rewarded for that commitment”. This status is awarded when a business partner displays qualified skills, revenue achievements, or demonstrated that their IBM-based solutions have been successfully implemented at a customer site through a customer experience. IBM provides Advanced Business Partners with an enhanced level of benefits to in marketing, sales support, technical enablement and skill development.

Ready for IBM Power Systems Software validation enables business partners to demonstrate and validate the integration between their solutions and the IBM Power Systems Software portfolio.

“We are proud to elevate our relationship with IBM to a new and higher level,” said Shmuel Zailer, CEO, Raz-Lee Security. “After the many years of our working together with IBM and implementing advanced security technology all over the world, we have been rewarded with the new status. I’m confident that the additional advantages and support we receive from IBM will help accelerate the distribution of our solutions worldwide”.

Written by Shari Masafy, MarCom Manager at Raz-Lee
Email Shari Masafy at
marketing@razlee.com


AIG-Israel Selects Raz-Lee's iSecurity for its System i Security Infrastructure

July 15, 2009

aig_israel_isecurityRaz-Lee Security, a leading supplier of information security solutions for IBM System i Servers, announced that AIG-Israel, a leading Direct Insurance company affiliated with the AIG group, has selected an information security solution from Raz-Lee Security for the protection of AIG’s server infrastructure.

AIG-Israel attaches high importance to the protection of its System i (IBM-AS/400) servers, as they are the central servers of the organization. The insurance company chose iSecurity based on their previous experience with Raz-Lee Security’s products, and following the recommendation of independent professional advisors.

The iSecurity system selected by AIG-Israel provides a comprehensive security solution for preventing breaches and potential damage to the organization’s activities. iSecurity enables AIG to block break-in attempts from external sources, to receive detailed reports on employee activities (including actual screen captures of user activity), and to control user’s rights to view data. In addition, the system continuously informs relevant staff regarding changes in the business-critical databases of the company, using real-time alerts and timeline reports displaying all changes relating to any subject. These reports can integrate information from all the company’s systems (financial, purchase and manufacturing).

“iSecurity significantly simplifies the protection of our centralized computer systems, especially in the TCP/IP environment,” said Mr. Etzion Yatsiv, VP and Chief Information Officer, AIG-Israel. “Considering all the flexible option it offers, iSecurity is extremely easy to use”, added Mr. Yatsiv.

“We are proud to cooperate with a large international insurance company such as AIG,” said Eli Spitz, VP Business Development, Raz-Lee Security. “iSecurity was designed to supply the numerous insurance companies within our clientele with the rock-solid protection they need, as well as with advanced monitoring capabilities, which enable their business operations to be conducted properly and safely”, added Mr. Spitz.

About AIG
AIG-Israel is one of Israel’s leading insurance companies, operating since 1997 under the joint ownership of Aurec and the AIG group. The company is licensed for general and life insurance activities. AIG Israel offers personal insurance (auto, home health), commercial insurance (including property, employer’s liability, professional and director’s liability), and life insurance. For more information visit http://www.aig.co.il.

About Raz-Lee Security Inc.
Raz-Lee Security, headquartered in Nanuet, New York, is the leading security solution provider for IBM’s System i (AS/400) computers. Drawing upon its 25 years of expertise in the System i Performance and Optimization market, the company designs, develops and markets a comprehensive suite of advanced security software solutions – iSecurity.

For more information please contact:

Eli Spitz
VP Business Development
Raz-Lee Security
Tel: 1-888-729-5334
Email: eli.spitz@razlee.com
Website: http://www.razlee.com


AIG-Israel Selects Raz-Lee’s iSecurity for its System i Security Infrastructure

July 15, 2009

aig_israel_isecurityRaz-Lee Security, a leading supplier of information security solutions for IBM System i Servers, announced that AIG-Israel, a leading Direct Insurance company affiliated with the AIG group, has selected an information security solution from Raz-Lee Security for the protection of AIG’s server infrastructure.

AIG-Israel attaches high importance to the protection of its System i (IBM-AS/400) servers, as they are the central servers of the organization. The insurance company chose iSecurity based on their previous experience with Raz-Lee Security’s products, and following the recommendation of independent professional advisors.

The iSecurity system selected by AIG-Israel provides a comprehensive security solution for preventing breaches and potential damage to the organization’s activities. iSecurity enables AIG to block break-in attempts from external sources, to receive detailed reports on employee activities (including actual screen captures of user activity), and to control user’s rights to view data. In addition, the system continuously informs relevant staff regarding changes in the business-critical databases of the company, using real-time alerts and timeline reports displaying all changes relating to any subject. These reports can integrate information from all the company’s systems (financial, purchase and manufacturing).

“iSecurity significantly simplifies the protection of our centralized computer systems, especially in the TCP/IP environment,” said Mr. Etzion Yatsiv, VP and Chief Information Officer, AIG-Israel. “Considering all the flexible option it offers, iSecurity is extremely easy to use”, added Mr. Yatsiv.

“We are proud to cooperate with a large international insurance company such as AIG,” said Eli Spitz, VP Business Development, Raz-Lee Security. “iSecurity was designed to supply the numerous insurance companies within our clientele with the rock-solid protection they need, as well as with advanced monitoring capabilities, which enable their business operations to be conducted properly and safely”, added Mr. Spitz.

About AIG
AIG-Israel is one of Israel’s leading insurance companies, operating since 1997 under the joint ownership of Aurec and the AIG group. The company is licensed for general and life insurance activities. AIG Israel offers personal insurance (auto, home health), commercial insurance (including property, employer’s liability, professional and director’s liability), and life insurance. For more information visit http://www.aig.co.il.

About Raz-Lee Security Inc.
Raz-Lee Security, headquartered in Nanuet, New York, is the leading security solution provider for IBM’s System i (AS/400) computers. Drawing upon its 25 years of expertise in the System i Performance and Optimization market, the company designs, develops and markets a comprehensive suite of advanced security software solutions – iSecurity.

For more information please contact:

Eli Spitz
VP Business Development
Raz-Lee Security
Tel: 1-888-729-5334
Email: eli.spitz@razlee.com
Website: http://www.razlee.com


Raz-Lee Security Partners with nuBridges for Advanced Encryption & Tokenization

July 14, 2009

nubridgesRaz-Lee, Expert System i Security Solution Provider, Adds nuBridges Protect™ Software to Product Portfolio to Help Organizations in Israel Comply with Data Security Mandates

Raz-Lee Security, a leading supplier of information security solutions, announced today that it has partnered with nuBridges,  the secure eBusiness authority. Under the terms of the agreement, Raz-Lee Security will sell nuBridges Protect™, an award-winning encryption, tokenization and key management solution, to customers in Israel – the first encryption and tokenization solution to be sold in this country.

“With over 20 years of security focus and its strong IBM partnership, Raz-Lee has achieved an outstanding level of expertise and has become a leading security solution provider worldwide,” said Kim Addington, nuBridges Chief Marketing Officer. “We’re looking forward to working with Raz-Lee in Israel to help organizations achieve optimal data security and more easily comply with data security mandates and privacy laws.”

Designed for enterprises that need to protect payment card numbers as well as volumes of personally identifiable information (PII) from theft, nuBridges Protect reduces complexity and simplifies compliance management. It protects sensitive data at rest in database fields, files, applications and associated backup storage to help companies comply with mandates like the Payment Card Industry’s Data Security Standard (PCI DSS) and government privacy acts. Proven in production use for business-critical operations, nuBridges Protect is protecting millions of credit card numbers for some of the most prominent brands in the world.

nuBridges Protect is a multi-platform solution supporting Windows, Unix, IBM i and Mainframe, and offers full-lifecycle, PCI DSS-compliant encryption key management plus the latest in data security models, tokenization. One major advantage of using the tokenization module of nuBridges Protect is that it can remove applications and databases from the scope of PCI DSS audits, yielding significant cost, complexity and time savings.

nuBridges Protect’s superiority was acknowledged by Info Security Products Guide, which proclaimed it the Winner of 2009 Global Excellence in Compliance Solution Award.

nuBridges Protect will complement Raz-Lee’s iSecurity, which is a comprehensive, user-friendly security solution for iSeries (System i or AS/400) environments. iSecurity addresses insider threats, external security risks, and the need to monitor business-critical application data. iSecurity enables enterprises to comply with the requirements of the PCI, Sarbanes-Oxley, and HIPAA security regulations, as well as COBIT implementation guidelines. It includes over 15 individual products, securing companies’ iSeries infrastructure, as well as their business-critical databases.

“We’ve built an international business on providing a breadth of security solutions for enterprise IT and we’re excited to be able provide our customers with an award-winning solution—nuBridges Protect,” said Shmuel Zailer, CEO for Raz-Lee Security. “With nuBridges Protect, our customers will enjoy the benefits of an all-inclusive PCI-DSS compliance solution, complete with encryption and tokenization.”

Eli Spitz
VP Business Development
Raz-Lee Security Inc.
Tel: 1-888-729-5334
E-mail: eli.spitz@razlee.com
Website: http://www.razlee.com

Kathy Cabrera
Carabiner Communications
1-678-644-4122
kcabrera@carabinerpr.com


iSecurity Compliance Evaluator – Featured in IBM Systems Magazine

July 9, 2009

ce in ibm magazine

Check out iSecurity Compliance Evaluator in IBM Systems Magazine, IBM i Issue.

Click here to view article.


Raz-Lee System i Experts Provide Free Guidance to Italian Enterprises on Implementation of New Data Security Regulation

June 24, 2009

isecurity_italyRaz-Lee Security has launched an innovative educational venture, in order to help Italian enterprises understand and implement the new amendments to the Italian Privacy Code 196/2003, concerning System Administrators’ role in company’s data security.

The new legislation specifies procedures for data protection, including technical and administrative measures which companies are required to implement. It holds IT departments directly responsible for user access and actions relating to companies’ information systems. Obviously, this has significant implications on System i Security as well. The legislation is expected to come into effect on June 30th 2009, after being publicized on 14 January 2009, followed by subsequent delays in its enforcement.

In the framework of the new venture, Raz-Lee has been holding free seminars explaining the requirements of the new legislation and how to implement it on System i. The sessions are conducted by Raz-Lee System i Security experts residing in Italy, who also provide ongoing technical support to Raz-Lee’s Italian customers. The meetings are conducted in intimate forums, with up to seven companies attending, in order to enable effective interactive discussions.

So far, Raz-Lee has held over 30 Round Table meetings across Italy, from Milan and Como to Naples and Sicily. Following the success and enthusiastic feedback from attending companies, Raz-Lee will continue to host such meetings. The meetings are attended by IT staff as well as top management of Italian companies.

The Round Table meetings cover the following topics:

Security Assessment of System i
Access monitoring & Control (FTP, ODBC, SQL)
System auditing
– Centralized Management
– Reporting

“We are glad to be contributing tangible value to Italian enterprises in the area of our expertise, System i Security,” said Nicola Fusco, South Europe Area Manager, Raz-Lee Security. “We have a large, long-standing installed base in Italy, and it has widened further since we began this exceptional tour.”

For more information on Round Table meetings in Italy, email info.southeurope@razlee.com

Written by Shari Masafy, MarCom Manager at Raz-Lee Security
Email Shari Masafy at
marketing@razlee.com


US President Proclaims CyberSecurity a Top Priority – will this Change Companies' Complacent Attitudes?

June 8, 2009

cybersecurityFinally, CyberSecurity is getting the importance it warrants, and by none other than the President of the United States, Barack Obama. The new administration announced on May 29th the launch of a major CyberSpace Security Project, headed by a top-level office to better protect information networks and critical infrastructure.

“From now on, our digital infrastructure — the networks and computers we depend on every day — will be treated as they should be: as a strategic national asset. Protecting this infrastructure will be a national security priority.” President Barack Obama

Hopefully, Obama’s enthusiastic drive for change will help alter overly complacent attitudes toward security. Amazingly, such attitudes are prevalent not only among the general public, but even at top government offices, as seen in the article Does the State Dept. Ignore Security? (Datamation.com). The article describes the frequency of incidents in which State Department employees access celebrities’ personal information out of curiosity. Moreover, an audit conducted at the State Department’s Office of the Inspector General (OIG) discovered “many control weaknesses – including a general lack of policies, procedures, guidance, and training” relating to information security.

The Obama administration’s Cyberspace Policy Review cites substantial damages caused by security hazards:

Failure of critical infrastructures. CIA reports malicious activities against information technology systems have caused the disruption of electric power capabilities in multiple regions overseas, including a case that resulted in a multi-city power outage.

Exploiting global financial services. In November 2008, the compromised payment processors of an international bank permitted fraudulent transactions at more than 130 automated teller machines in 49 cities within a 30-minute period, according to press reports. In another case reported by the media, a U.S. retailer in 2007 experienced data breaches and loss of personally identifiable information that compromised 45 million credit and debit cards.

Systemic loss of U.S. economic value. Industry estimates of losses from intellectual property to data theft in 2008 range as high as $1 trillion.16

With such heavy tolls recognized, perhaps more conscientious approaches to information security will trickle down from government officials to private companies and IT managers.

Written by Shari Masafy, MarCom Manager at Raz-Lee Security
Email Shari Masafy at marketing@razlee.com


US President Proclaims CyberSecurity a Top Priority – will this Change Companies’ Complacent Attitudes?

June 8, 2009

cybersecurityFinally, CyberSecurity is getting the importance it warrants, and by none other than the President of the United States, Barack Obama. The new administration announced on May 29th the launch of a major CyberSpace Security Project, headed by a top-level office to better protect information networks and critical infrastructure.

“From now on, our digital infrastructure — the networks and computers we depend on every day — will be treated as they should be: as a strategic national asset. Protecting this infrastructure will be a national security priority.” President Barack Obama

Hopefully, Obama’s enthusiastic drive for change will help alter overly complacent attitudes toward security. Amazingly, such attitudes are prevalent not only among the general public, but even at top government offices, as seen in the article Does the State Dept. Ignore Security? (Datamation.com). The article describes the frequency of incidents in which State Department employees access celebrities’ personal information out of curiosity. Moreover, an audit conducted at the State Department’s Office of the Inspector General (OIG) discovered “many control weaknesses – including a general lack of policies, procedures, guidance, and training” relating to information security.

The Obama administration’s Cyberspace Policy Review cites substantial damages caused by security hazards:

Failure of critical infrastructures. CIA reports malicious activities against information technology systems have caused the disruption of electric power capabilities in multiple regions overseas, including a case that resulted in a multi-city power outage.

Exploiting global financial services. In November 2008, the compromised payment processors of an international bank permitted fraudulent transactions at more than 130 automated teller machines in 49 cities within a 30-minute period, according to press reports. In another case reported by the media, a U.S. retailer in 2007 experienced data breaches and loss of personally identifiable information that compromised 45 million credit and debit cards.

Systemic loss of U.S. economic value. Industry estimates of losses from intellectual property to data theft in 2008 range as high as $1 trillion.16

With such heavy tolls recognized, perhaps more conscientious approaches to information security will trickle down from government officials to private companies and IT managers.

Written by Shari Masafy, MarCom Manager at Raz-Lee Security
Email Shari Masafy at marketing@razlee.com


iSecurity Allows International Delta Galil To Closely Monitor System i (iSeries/AS400)

May 26, 2009

deltaDelta Galil, a worldwide manufacturer and provider of fashion & basic apparel, has selected iSecurity to protect their System i/AS400  environment.

And here’s what they have to say about iSecurity: “iSecurity offers us a full response to our needs as a public company committed to organized procedures – follow-up on all user access and activity,” said Ashraf Shofani, System i Manager, Delta Galil. “Furthermore, we became acquainted with the system in one day, configured it in a single session, and since then it has run automatically.”

As a public company, Delta Galil (TLV: DELT) is obligated to ensure transparency and close control of its information systems and System i environment. Accordingly, they monitor network access, perform system auditing using Firewall and Audit products, and submit user access reports.

After examining several products on the market, Delta decided on iSecurity solution, due to its ability to produce reports which are fully customized to the company’s requirements. Delta was particularly impressed with iSecurity’s easy deployment and user interface, facilitating the corporate System i security experience.

Delta’s iSecurity solution includes:
Firewall – secures every type of network access to and from the System i.
Password – integrates all OS/400 password management capabilities, blocking non-secure passwords.
Screen – protects unattended terminal screens.
Audit – reports on user activities and object access in real-time, including multi-system environments.
Action – invokes corrective and reporting procedures for detected security breaches in other iSecurity modules, and sends emails, SMS and SYSLOG messages.
User Profile Manager – presents comprehensive information on user profiles
AP-Journal Regulation Compliance – reports on changes in application databases.

Using Firewall, the Delta team monitors all access – both internal and external – to the system, and when anyone commits a breach, the System i manager immediately gets an alert. Using Audit, the manager gets reports on the use of specific software on which Delta is obligated to report. The manager is notified whenever someone attempts to access a file or library which is blocked.

Written by Shari Masafy, MarCom Manager at Raz-Lee Security
Email Shari Masafy at
marketing@razlee.com


New White Paper – PCI Compliance with IBM Power i

May 20, 2009

pci_compliance_white_paperCheck out our new white paper on Achieving PCI Compliance with IBM Power i. PCI-DSS consists of 12 requirements within six categories which cover best security practices. This white paper includes a summary of PCI requirements, focusing on the relevant items to Power i security. Each requirement is followed by a guideline specifying how to actually implement the requirement.

Download PCI Compliance White Paper  (Free)