Enhancing IBM i Exit Point Security:
Remote & local user control, alerts, auditing & reporting
IBM i exit points allow custom-written programs to launch when users access system functions, such as FTP, ODBC, executing remote commands, 5250 sign-on and accessing the IFS.
Exit point programs can allow or deny access, log activity, impose additional security restrictions, alert staff, and perform other desired functions.
In this webinar, we'll explore how iSecurity Firewall can enhance and automate IBM i exit point security, including:
- What IBM i exit points are, how they work, and why they’re important to IBM i security and audit reporting
- Why exit points, appliance firewalls and menu security aren’t enough to completely secure IBM i installations from remote & local users
- How iSecurity Firewall enhances IBM i exit point security by providing complete user access control (read, write, delete, rename, run) and protection for IBM i objects and IFS files
- How to easily configure and report on exit point activity for security and auditing needs
Mel Zucker is a 30-year IBM veteran, who worked in AS/400 and IBM i customer engineering, program support, system engineering, and technical consulting. For the last 15 years, Mel has served as a lead technical support resource for SEA’s internal and external customers. He is well versed in all aspects of IBM i system administration, operations, security, and compliance, and teaches highly technical material such as IBM i SIEM integration in a down-to-earth manner.