Introducing G2.ai, the future of software buying.Try now
Product Avatar Image

iSecurity Field Encryption

Show rating breakdown
32 reviews
  • 17 profiles
  • 16 categories
Average star rating
4.4
Serving customers since
1983

Featured Products

Product Avatar Image
iSecurity Field Encryption

11 reviews

iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting compliance with PCI-DSS, GDPR, HIPAA, SOX, other government regulations and state privacy laws.

Product Avatar Image
iSecurity Anti-Virus

3 reviews

iSecurity Anti-Virus is a dedicated IBM i specific product engineered to provide full protection to the server, its file contents, and resident IBM i dedicated software since closed computing environments are all but extinct today. Although the IBM i doesn't run .exe files, it can house infected files that wait silently till transferred and opened on a PC. In addition, protection and the ability to scan IBM i IFS objects has become necessities of several industry regulations, including the credit card industry’s PCI auditing requirements.

Product Avatar Image
iSecurity Safe-Update

5 reviews

iSecurity Safe-Update protects IBM i business critical data against updates by unauthorized programs. Such programs are those who come from a library which is not used to store production programs, file editors, DFU and Start SQL (STRSQL). It ensures that updates are made by pre-confirmed programs or by programs that are not known as file editors.

Product Avatar Image
iSecurity Audit

5 reviews

iSecurity Audit enhances native IBM i auditing by monitoring and reporting on all activities in the IBM i environment. It employs real-time detection to identify security events as they occur and record details in a log file. Audit logs can be displayed in simple, graphical formats with accompanying explanations for each entry to aid quick interpretation of statistical information. More importantly, real-time detection triggers alerts and/or takes immediate corrective action.

All Products & Services

Profile Filters
Product Avatar Image
iSecurity Field Encryption

11 reviews

iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting compliance with PCI-DSS, GDPR, HIPAA, SOX, other government regulations and state privacy laws.

Product Avatar Image
iSecurity Audit

5 reviews

iSecurity Audit enhances native IBM i auditing by monitoring and reporting on all activities in the IBM i environment. It employs real-time detection to identify security events as they occur and record details in a log file. Audit logs can be displayed in simple, graphical formats with accompanying explanations for each entry to aid quick interpretation of statistical information. More importantly, real-time detection triggers alerts and/or takes immediate corrective action.

Product Avatar Image
iSecurity Safe-Update

5 reviews

iSecurity Safe-Update protects IBM i business critical data against updates by unauthorized programs. Such programs are those who come from a library which is not used to store production programs, file editors, DFU and Start SQL (STRSQL). It ensures that updates are made by pre-confirmed programs or by programs that are not known as file editors.

Product Avatar Image
iSecurity Anti-Virus

3 reviews

iSecurity Anti-Virus is a dedicated IBM i specific product engineered to provide full protection to the server, its file contents, and resident IBM i dedicated software since closed computing environments are all but extinct today. Although the IBM i doesn't run .exe files, it can house infected files that wait silently till transferred and opened on a PC. In addition, protection and the ability to scan IBM i IFS objects has become necessities of several industry regulations, including the credit card industry’s PCI auditing requirements.

Product Avatar Image
iSecurity Change Tracker

3 reviews

iSecurity Change Tracker is dedicated to automatically monitoring and logging object changes, especially those made to production libraries, at both the source and object levels. Since Change Tracker relies solely on the actual updates within a library, no manual intervention is required.

Product Avatar Image
iSecurity AP-Journal

2 reviews

iSecurity AP-Journal protects business-critical information from insider threats and from external security breaches, notifies managers of any changes to information assets and streamlines IBM i journaling procedures. iSecurity AP-Journal logs the who, what, when and which of activities. It logs database access (READ operations) directly into the journal receivers, which is not provided by IBM i journaling and is an important component of compliance.

Product Avatar Image
iSecurity DB-Gate

2 reviews

DB-Gate empowers IBM i customers with exciting data access capabilities, based on Open Database Connectivity (ODBC), employing standard IBM i facilities to enable fully database-transparent access to remote systems.

Product Avatar Image
iSecurity Visualizer

1 review

iSecurity Visualizer is a Business Intelligence System for display and analysis of data from the IBM i server. It allows IT managers and system administrators to graphically analyze IBM i security related activities instantaneously and without OS/400 technical knowledge.

Product Avatar Image
iSecurity Anti-Ransomware

0 reviews

iSecurity Anti-Ransomware protects against ransomware attacks and other kinds of malware that may access and change IBM i data on the IFS. It prevents ransomware from damaging valuable data while preserving performance.

Profile Name

Star Rating

21
10
1
0
0

iSecurity Field Encryption Reviews

Review Filters
Profile Name
Star Rating
21
10
1
0
0
Péter G.
PG
Péter G.
Process Manager at Nokia
09/12/2024
Validated Reviewer
Review source: G2 invite
Incentivized Review

iLikeit product

That the software protects not only production data but your test environments also. This also applies to anything related to the overall product and any enhancements related to it.
RN
raj N.
08/31/2024
Validated Reviewer
Review source: Organic

Best Platform For Security Audit and i loved it

Their are many kinds of safety highlights what we get from the I security Review and their easy to use interface make them more helpful and dependable for us. They have numerous elements that tackle our inquiries and make our work extremely secure and bother free. The mix cycle of I security Review have extremely easy to understand and client support alwayws be their to furnish assist with each and every means.
PC
Pinkie C.
08/21/2024
Validated Reviewer
Review source: G2 invite
Incentivized Review

Best Platform For Security Audit

Their are many types of security features what we get from the I security Audit and their user friendly interface make them more useful and reliable for us. They have multiple features that solve our queries and make our work very secure and hassle free. The integration process of I security Audit have very user friendly and user support alwayws be their to provide help with every single steps.

About

Contact

HQ Location:
Nanuet, NY

Social

@razleesecurity

What is iSecurity Field Encryption?

iSecurity Field Encryption, offered by Raz-Lee Security, is a comprehensive data encryption solution designed to protect sensitive data within IBM i environments. This product ensures that critical information, such as personal data, financial details, and other sensitive attributes, are encrypted at the field level, thereby enhancing security and compliance with regulations such as GDPR, PCI DSS, and HIPAA.Field Encryption by Raz-Lee employs strong encryption algorithms to secure data while maintaining performance efficiency. It provides dynamic data masking to secure data access dynamically and enables restricted access to sensitive data, ensuring that only authorized personnel can view or modify it. The solution is tailored to seamlessly integrate into existing IBM i systems, enhancing security without disrupting operational workflows.The configurability of Raz-Lee's Field Encryption allows organizations to apply encryption based on specific fields within databases, giving businesses a flexible and focused approach to data security. The product also includes auditing capabilities to track access and changes to encrypted fields, supporting adherence to strict security and compliance mandates.

Details

Year Founded
1983
Website
razlee.com