{"_id":"agxzfmlsbGlzdHNpdGVyGAsSC05ld19Db21wYW55GICAgN6Yo80IDA","lastupdate":"2024-06-10T00:00:00.000Z","update_date":"2024-06-10T00:00:00.000Z","lastModified":"Sep 7, 2024","active":1,"confidence_score":100,"confidence_score_reason":"funding rounds, markets","urlname":"raz-lee","minimal_profile":null,"status":"","fullstatus":"","acquired":0,"hide_reason":null,"hide_reason_data":null,"hide_reasons":[{"id":"8257rxn4P8EFQOmS5hAAauHyYMhhxrA5u6yWX4XUShpybX3AMNo3Y9","reason":"Pending approval - External entity"},{"id":"aOIaOiiqfpA8UMw6VCTh8ueRmkG3lzDy1NGqEOaJbe11OrCzMTCCd6","reason":"The company is a service provider"},{"id":"ddgjKuc3GgH8E5UehSVJviRl471BCajL1plO8HtGoOojy2NivYqQ7x","reason":"Owner asked to delete"},{"id":"EjOKM211H1ira9J63oaGPuUxvr7Oba55TZo3NWsFO5uhbNu7o4x4zD","reason":"The company is not Israeli"},{"id":"J7fQJtnT3GdWWSE3MD8rzaW65LJ4jEIKxSZnneQiReONdZjG3zIqWe","reason":"Owner asked to hide in the meantime"},{"id":"NxlAC3ReFb5ksiYNLp2FnUyluoJzwRCYfcF7xpTZaPM53SdWQ5kv0B","reason":"Pending approval"},{"id":"RhC1tlwXzioK0MfzBII3H2wepEfQOfKVktmdwqeqTJjGi3ZaBWUqZo","reason":"The company is not innovative"},{"id":"S0Ed46vNI6vZYVxLedANWGjas23K6hY0QdsCtiGYL7lshqIEdLV3sA","reason":"The company ceased operations in Israel"},{"id":"VTANq7bEvlsEcPjp0ghelXfShaCosgndONGjgU730aAOxXtaDIF5j3","reason":"This is a product of an existing company"}],"type":"Startup","logokey":"$IGNGvwyK0wJWyPO8k0JPWwQ2JyA6ImQfVQd45Ti6YKQ1fMOG8ivQRi","name":"Raz-Lee Security","oneliner":"Cybersecurity and Compliance Solutions for IBM i Servers","registrar":"513166116","website":"https://razlee.com","careerspage":"https://razlee.com/careers-at-raz-lee/","founded_month":10,"founded_year":1983,"formernames":[],"sociallinks":{"twitter":"https://twitter.com/razleesecurity","youtube":"https://www.youtube.com/user/RazLeeSecurity","facebook":"https://www.facebook.com/RazleeiS","linkedin":"https://www.linkedin.com/company/448473","instagram":""},"social":["https://www.youtube.com/user/RazLeeSecurity","https://www.facebook.com/RazleeiS","https://twitter.com/razleesecurity","https://www.linkedin.com/company/448473"],"flattenedsociallinks":"https://www.youtube.com/user/RazLeeSecurity|https://www.facebook.com/RazleeiS|https://twitter.com/razleesecurity|https://www.linkedin.com/company/448473","apps":{"appstore":"","googleplay":""},"is_claimed_by_owner":1,"employees":"11-50","employees_exact":21,"patent":0,"raised":0,"stage":"Mature","public_stage":"Mature","primary_sector_key":"agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","primary_sector":"Cyber Security","alternativenames":["Raz Lee Security","RazLee Security"],"about":"Raz-Lee Security is a cybersecurity and compliance solutions providers for IBM i servers (AS/400). It delivers the highest level of threat visibility and protection, including comprehensive solutions that allow organizations to comply with global regulations such as GDPR, PCI, and SOX.\n\nRaz-Lee’s flagship iSecurity suite guards organizations against insider threats and unauthorized external access to business-critical information hosted on their IBM i. The company has developed cutting-edge solutions that have revolutionized analysis and fortification of IBM i servers. Raz-Lee builds solutions that work with other companies’ technologies allowing organizations to monitor IBM i activity via SIEM or DAM dashboards.","climatetech_description":null,"is_climatetech_relevant":null,"phone":"+97299588860","country":null,"address":{"israeli":[{"id":"13c1ae8b-c423-40a8-80a5-b43400fe1a39","city":"Herzliya","type":null,"address":"HaNadiv St 71, Herzliya, Israel","placeid":null,"notactive":0,"openeddate":null,"registrarid":null,"firstrdcenter":0,"registrarname":null}],"officesabroad":[{"id":"43b39922-c22c-42a0-a7c3-2171ae0049e3","city":"Rdental","address":"Schulstrae 32, 96472 Rdental, Germany","country":"Germany","placeid":null},{"id":"deff3a7a-4812-4f47-b112-74648a8314c6","city":"Nanuet","address":"12 Englewood Ave, Nanuet, NY 10954, USA","country":"United States","placeid":null}]},"headquarter_address":null,"district":"Center District","news":[{"id":"2ba916d7-68a8-4abf-9e68-33e6a9bb09b7","date":"May 20, 2020","link":"https://www.itjungle.com/2020/05/20/raz-lee-launches-web-interface-for-isecurity-suite/","source":"www.itjungle.com","visible":1,"analysis":{"tags":"Graphical User Interface, GUI, IBM i, Java, Linux, Raz-Lee Security","company":"Raz-Lee Security","layoffs":null,"summary":"Raz-Lee Security has introduced a new Web-based graphical user interface (GUI) called iSecurity Web GUI, which allows users to access the companys suite of tools through a browser. The GUI runs on Windows and is compatible with Chrome, Firefox, and Edge browsers, as well as mobile devices and tablets. It provides access to components such as Firewall, Audit, SIEM, Compliance, and more. The iSecurity Web GUI also supports the use of Visualizer, an integrated business intelligence tool. The GUI includes a Web server component and can be used on non-Windows machines. The new offering is expected to contribute to the companys growth.","partners":null,"customers":null,"investors":null,"confidence":8,"key_topics":["Web-based GUI","iSecurity Suite","Eclipse-based product","Web server component","Non-Windows machine"],"date_of_event":"May 20, 2020","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Customers"],"acquisition_amount":null,"structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"FacsN168FnF6AkgAwyQInmqdKh6BgGp28rhAXmua4DLEbMENd7sTds","news_summary":"Raz-Lee Launches Web Interface for iSecurity Suite - IT Jungle","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"334d858d-663f-4376-bf8e-41257bf0d1dc","date":"Sep 16, 2019","link":"https://www.mcpressonline.com/news/security-news/raz-lee-security-announces-major-software-upgrade-for-isecurity-firewall","source":"www.mcpressonline.com","visible":1,"analysis":{"tags":"software upgrade","company":"Raz-Lee Security","layoffs":null,"summary":"Raz-Lee Security announces a major software upgrade for the iSecurity Firewall, introducing enhancements such as a complete What-If system, improved socket exit points, and free-style rules. The upgrade aims to provide convenience and agility in protecting IBM i systems from evolving threats. The CEO, Shmuel Zailer, emphasizes the commitment to security solutions. The iSecurity Firewall 18.08 is now available for purchase through certified business partners.","partners":null,"customers":null,"investors":null,"confidence":9,"key_topics":["software upgrade","enhancements","firewall","socket exit points","free-style rules"],"date_of_event":null,"valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Customers"],"acquisition_amount":null,"structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"5eR7qgAlp79fvXKCLjCpK6YGnPpgSv1j5A1gRQfsHvkRitwNDvXomJ","news_summary":"Raz-Lee Security Announces Major Software Upgrade for iSecurity Firewall","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"770cb002-7a58-4f68-810e-13b9ce5de06c","date":"May 2, 2019","link":"https://www.mcpressonline.com/news/security-news/raz-lee-security-announces-icap-client-for-isecurity-anti-virus","source":"www.mcpressonline.com","visible":1,"analysis":{"tags":"ICAP Client, iSecurity Anti-Virus","company":"Raz-Lee Security Inc","layoffs":null,"summary":"Raz-Lee Security Inc has released its ICAP Client for iSecurity Anti-Virus, which allows virus scanning to be performed outside the IBM i by organizational servers. This solution reduces the CPU load on IBM i servers and provides a consistent virus scanning solution. The ICAP Client supports various anti-virus software and allows multiple servers to scan the same file concurrently. The response time for an ICAP-enabled virus scan is quicker than scanning objects on the IBM i itself. The ICAP Client for iSecurity Anti-Virus is now available.","partners":"IBM","customers":null,"investors":null,"confidence":8,"key_topics":["ICAP Client","iSecurity Anti-Virus","virus scanning","CPU usage","IBM i"],"date_of_event":null,"valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Partners"],"acquisition_amount":null,"structuredIssuesShow":"#Partners","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"oa8TtCOHHgXwxkGFUFb8ZEAWwmVgoTmgIlM9dgVijiNOQyl0Jx0DyM","news_summary":"Raz-Lee Security Announces ICAP Client for iSecurity Anti-Virus","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"4d0cfbf5-9baa-4588-b059-445600f22cce","date":"Apr 10, 2019","link":"https://www.itjungle.com/2019/04/10/raz-lee-reels-in-the-file-editors/","source":"www.itjungle.com","visible":1,"analysis":{"tags":"Product Launch","company":"Raz-Lee Security","layoffs":"N/A","summary":"Raz-Lee Security has launched a new solution called iSecurity Safe Update, which allows file editors to be used without compromising security. File editors are popular on the IBM i platform as they allow developers and administrators to make changes to data quickly and easily. However, they can pose a security risk as they can be used to bypass organisational application rules. Safe Update ensures that updates are done by a preset list of programs, which can include or exclude file editors. It also allows a developer to get access to a file editor only if a work order has been entered into the system.","partners":"N/A","customers":"IBM i professionals","investors":"N/A","confidence":9,"key_topics":["File Editors","Safe Update","Security","IBM i platform","Database Access"],"date_of_event":"April 10, 2019","valuation_amount":"N/A","impact_on_company":"growth-positive","investment_amount":"N/A","structured_issues":"Customers","acquisition_amount":"N/A","structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"EvHmpHrINuBNwaZlfegw5dqs14wsmHb3n96jCAig55HDVQ1aitRtIe","news_summary":"Raz-Lee Reels In The File Editors - IT Jungle","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"aad45fc1-72a8-41f3-a68c-5b93769dddc9","date":"Jun 18, 2018","link":"https://www.itjungle.com/2018/06/18/raz-lee-debuts-anti-ransomware-for-ibm-i/","source":"www.itjungle.com","visible":1,"analysis":{"tags":["API","COMMON","DB2 for i","IBM i","IFS","Integrated File System","POWERUp18","Ransomware","X86"],"company":"IBM","layoffs":null,"summary":"Raz-Lee Security has launched a new solution, iSecurity Anti-Ransomware, aimed at combatting the spread of ransomware on IBM i servers. The solution detects ransomware attacks, suspends the attack, and alerts security officers and SIEMs. IBM i shops are increasingly falling victim to ransomware attacks, with the Windows-like Integrate File System (IFS) being vulnerable. Raz-Lee Securitys solution aims to protect against existing and future unknown ransomware and other types of malware. The company plans to release additional modules as part of its iSecurity Advanced Threat Protection (ATP) software suite. Ransomware was a $5 billion business in 2017 and is expected to remain a security threat in the future.","partners":["COMMON"],"customers":null,"investors":null,"confidence":8,"key_topics":["Ransomware","IBM i","Security","Open source","Malware"],"date_of_event":"June 18, 2018","valuation_amount":null,"impact_on_company":"growth-negative","investment_amount":null,"structured_issues":["Customers"],"acquisition_amount":null,"structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-red.svg);"},"sentiment":"growth-negative","analysisId":"UFkRc8rwprer3H3P7XNyxAOPiM5m1RJvI0gAWL4AIpTPEa4lmTquw5","news_summary":"Raz-Lee Debuts Anti-Ransomware For IBM i - IT Jungle","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"e3320514-73bf-4632-b462-b69b905d155f","date":"Feb 7, 2018","link":"https://www.itjungle.com/2018/02/07/ibm-need-independent-security-vendors/","source":"www.itjungle.com","visible":1,"analysis":{"tags":["consolidation","IBM i security","acquisitions"],"company":"HelpSystems","layoffs":null,"summary":"HelpSystems has been the biggest force for consolidation in the IBM i business, acquiring several IBM i security software firms. The consolidation in the IBM i space is seen as inevitable, with some independent vendors believing it can be good for customers while others see it as detrimental. The CEOs of independent IBM i security software firms express different views on consolidation, with some open to potential deals and others focused on serving their customers and maintaining innovation. The CEOs agree that having a base of independent software vendors is important for customer choice and market competition. They emphasize the need for continued innovation in the face of growing threats to IBM i security.","partners":null,"customers":null,"investors":null,"confidence":8,"key_topics":["consolidation","IBM i security","independent vendors","customer needs","innovation"],"date_of_event":"February 7, 2018","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Partners","Acquisition"],"acquisition_amount":null,"structuredIssuesShow":"#Partners  #Acquisition","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"IR5k1TJtaqY4YrV5hlsGVCLyEzreAnj0hxU5DeGtlXJs0Xb7pEed0d","news_summary":"Does IBM i Need Independent Security Vendors? - IT Jungle","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"5b3a28b8-4893-4c8e-880f-7378251f4e07","date":"Apr 24, 2016","link":"http://www.itjungle.com/tfh/tfh042516-story01.html","source":"www.itjungle.com","visible":1,"analysis":{"tags":["software vendors","IBM i 7.3","Power Development Cloud","ISVs","OS","security features","RPG enhancements","open source tools","IBM i products","high availability products","terminal emulators","IBM i security tool","JD Edwards","ERP software","change management","business intelligence software","PDP","Java 6"],"company":"IBM","layoffs":null,"summary":"The article discusses the release of IBM i 7.3 and the support it has received from software vendors. IBM i 7.3 brings new features such as analytic functions, security features, RPG enhancements, and expanded support for open source tools. The article highlights that many vendors have already announced their support for IBM i 7.3, with some already fully testing and supporting the new OS. IBMs Power Development Cloud (PDP) program has helped vendors in supporting IBM i 7.2 TR4 as well. The article also mentions some vendors who are not yet supporting the new releases, such as Oracle and Micro Focus. Overall, the impact of the article on IBM is growth-positive as it showcases the support and readiness of software vendors for the new OS.","partners":null,"customers":null,"investors":null,"confidence":8,"key_topics":["IBM i 7.3","software vendors","Power Development Cloud","ISVs","support"],"date_of_event":"April 12, 2016","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Customers","Partners"],"acquisition_amount":null,"structuredIssuesShow":"#Customers  #Partners","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"z4CBx0TmpqzzVJ7rczIQG766Wr0L8MeEyHKcYbqlVmyWknkzTxIk4h","news_summary":"Software Vendors Prep For IBM i 7.3, Applaud PDP for Testing - IT Jungle","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"}],"newsNumber":7,"events":null,"techcommunityinvolvement":null,"mediagallery":[{"id":"T8XiVQlS4lVgAEnKoi2FFwUfsjmPaUtUBLE5XolU9yrBSzqhRbrcA3","timestamp":"2024-06-10 18:33:31.000000","resources_type":2,"resources_title":"","resources_file_name":"tZV8i80YmGg","alt":"","imageurl":"https://img.youtube.com/vi/tZV8i80YmGg/0.jpg","url":"http://youtu.be/tZV8i80YmGg"},{"id":"76c1aa01-2c8d-40fd-9add-66b458828a0f","timestamp":"2016-05-08 07:04:47.000000","resources_type":2,"resources_title":"","resources_file_name":"Oo2LyB6VrWM","alt":"","imageurl":"https://img.youtube.com/vi/Oo2LyB6VrWM/0.jpg","url":"http://youtu.be/Oo2LyB6VrWM"}],"tags":["threat-intelligence","compliance","application-security","it","cyber-security","encryption","ransomware","business-intelligence","multi-factor-authentication","gdpr","monitoring","firewall","insider-threat","enterprises","threat-detection"],"classificationIDs":["agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvc564JDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuzrJkKDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA"],"technologysuccessstory":null,"usecases":[],"businessmodels":["B2B"],"productstage":"Released","products":["iSecurity"],"geomarkets":["Global"],"targetmarkets":[],"marketcapital":null,"marketcapitaldate":null,"funding":{"investors":0,"lastfunding":"Undisclosed","totalrounds":0,"fundingstage":"Mature","totalfunding":"Undisclosed","publicinvestors":0,"lastpublicfunding":null,"totalpublicrounds":0,"totalpublicfunding":0},"team":[{"name":"Shmuel Zailer","email":"zailer@razlee.com","phone":"","gender":"Male","userid":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAoOHhwIYJDA","bounced":false,"claimed":0,"founder":1,"urlname":"shmuel-zailer","visible":1,"memberid":"agxzfmlsbGlzdHNpdGVyFwsSCk5ld19NZW1iZXIYgICgodShlgkM","position":"Co-founder, CEO & CTO","last_name":"Zailer","claimtoken":"8efe4a9eeb1a6da9ca4234974d0175ab8854af62f269247af0936589d0ebe98d","first_name":"Shmuel","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/shmuel-zailer-9069296/","unsubscribed":false,"is_activeuser":1,"additionalemail":"","claimedemaildate":"2020-08-05 14:28:11.000000","initials":"SZ","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"connect","teammembertagcontent":"Connect","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Milka Zailer","email":"milka@razlee.com","phone":"","gender":"Female","userid":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAoOGstpgIDA","bounced":false,"claimed":0,"founder":1,"urlname":"milka-zailer","visible":1,"memberid":"agxzfmlsbGlzdHNpdGVyFwsSCk5ld19NZW1iZXIYgICgodvtzggM","position":"Co-founder & COO","last_name":"Zailer","claimtoken":"b3ae519ee128d1972cc08da08a7a75a889fe8a867297a9b7155186a22e2d18d8","first_name":"Milka","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/milka-zailer-511b0a7/","unsubscribed":false,"is_activeuser":1,"additionalemail":"","claimedemaildate":"2020-08-05 14:28:09.000000","initials":"MZ","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"connect","teammembertagcontent":"Connect","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Nissim Menashe","email":"nissim@razlee.com","phone":"","gender":"Male","userid":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAgJ7R8MkIDA","bounced":true,"claimed":1,"founder":0,"urlname":"nissim-menashe-1","visible":1,"memberid":"agxzfmlsbGlzdHNpdGVyFwsSCk5ld19NZW1iZXIYgICg4aKLqgsM","position":"VP Operations & Marketing","last_name":"Menashe","claimtoken":"40a801d535975d80be21ede69f77349d98842dc4ddaae79af59204826a9bd3f5","first_name":"Nissim","picturekey":"$lEr0xbtTU8x5O6o2M6kiJeWYIEfeV0ekoFj5zfQCf40KIfMMXduQ4C","claimeddate":"2019-12-15","linkedinurl":"https://www.linkedin.com/pub/nissim-menashe/26/3b8/894","unsubscribed":false,"is_activeuser":1,"additionalemail":"","claimedemaildate":"2019-12-15 12:29:32.000000","initials":"","pictureurl":"https://storage.googleapis.com/clean-finder-353810/$lEr0xbtTU8x5O6o2M6kiJeWYIEfeV0ekoFj5zfQCf40KIfMMXduQ4C","linkedin-display":"flex","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""}],"description_edited":1,"tag_line_edited":1,"sector":"Security and Safety Technologies","sectorverify":{"id":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAgMGx9csJDA","fullname":"Rachel Wain"},"biverify":{"id":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAgMGgoMMJDA","fullname":"Yanina Wainscheinker"},"biverifydate":"2019-11-01T00:00:00.000Z","crunchbaseid":"raz-lee","lastupdator":"Yanina Wainscheinker","lastupdator_email":"yanina.wainscheinker@sncentral.org","creator":"Rebecca Mack","creator_email":"rebeccamack26@gmail.com","createdate":"2014-06-29T00:00:00.000Z","biverification":"Yanina Wainscheinker","sectorverification":"Rachel Wain","affiliatedOrganizations":null,"timeline":[],"investmentstage":[],"exits":[],"investments":[],"portfolio":[],"funds":[],"founded":"10/1983","databases":[],"sharedspaces":[],"utilities":[],"contributors":[],"employeesworldwide":"","fundingtype":"Startup","parsedName":"Raz-Lee Security","logourl":"https://storage.googleapis.com/clean-finder-353810/$IGNGvwyK0wJWyPO8k0JPWwQ2JyA6ImQfVQd45Ti6YKQ1fMOG8ivQRi","oglogourl":"https://storage.googleapis.com/clean-finder-353810/$IGNGvwyK0wJWyPO8k0JPWwQ2JyA6ImQfVQd45Ti6YKQ1fMOG8ivQRi","seoabout":"Raz-Lee Security is a cybersecurity and compliance solutions providers for IBM i servers (AS/400). It delivers the highest level of threat visibility and p...","seoTitle":"Israeli Startup","solutions":[],"teamMembersNumber":3,"primarySector":"Cyber Security","primary-sector-display":"block","classifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"GRC & Vulnerability","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvc564JDA","classificationName":"sectorclassification"},{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Cryptography","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA","classificationName":"coretechnology"},{"depth":2,"name":"Encryption","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuzrJkKDA","classificationName":"coretechnology"},{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"}],"classificationDelimited":["IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA>Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>GRC & Vulnerability#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvc564JDA","TechnologyClassificationModel>Cryptography#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","TechnologyClassificationModel>Cryptography#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA>Encryption#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuzrJkKDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA"],"classificationsViewModel":"|0:>IndustryClassificationModel|1:>IndustryClassificationModel/Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA|2:>IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA/Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA|0:>SectorClassificationModel|1:>SectorClassificationModel/Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/GRC & Vulnerability#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvc564JDA|0:>TechnologyClassificationModel|1:>TechnologyClassificationModel/Cryptography#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA|2:>TechnologyClassificationModel>Cryptography#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA/Encryption#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuzrJkKDA|","classificationTrees":{"sector":[{"title":"Cyber Security","key":"0-0","path":"SectorClassificationModel>Cyber Security","children":[{"title":"GRC & Vulnerability","key":"0-0-0","path":"SectorClassificationModel>Cyber Security>GRC & Vulnerability"}]}],"targetCustomer":[{"title":"Enterprise & Professional Services","key":"0-0","path":"IndustryClassificationModel>Enterprise & Professional Services","children":[{"title":"Enterprises","key":"0-0-0","path":"IndustryClassificationModel>Enterprise & Professional Services>Enterprises"}]}],"coreTechnology":[{"title":"Cryptography","key":"0-0","path":"TechnologyClassificationModel>Cryptography","children":[{"title":"Encryption","key":"0-0-0","path":"TechnologyClassificationModel>Cryptography>Encryption"}]}]},"sectorClassifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"GRC & Vulnerability","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvc564JDA","classificationName":"sectorclassification"}],"coreTechnologyClassifications":[{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Cryptography","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA","classificationName":"coretechnology"},{"depth":2,"name":"Encryption","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuzrJkKDA","classificationName":"coretechnology"}],"targetCustomerClassifications":[{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"}],"classificationNames":{"sector":["Cyber Security","GRC & Vulnerability"],"coreTechnology":["Cryptography","Encryption"],"targetCustomer":["Enterprise & Professional Services","Enterprises"]},"section":null,"sectionParams":"","queryParams":"","popup_claim_profile":"false","claimedBadge":"inline","display":{"mainContact":"none","climateTag":"none","seeMoreSimilarCompanisDisplay":"none","similarCompaniesTitleFontSize":"3.2rem","similarCompaniesTitle":"Similar Companies","similar_companies":[]},"mainContact":{},"_eventview":{"publicoffering_exit":[],"privateequityfunding":[],"nonequityfunding":[],"merger_acquisitions":[],"others":[]}}