On-Demand Webinar
Four Best Practices & Advanced Techniques for IBM i MFA
More than 80% of cyberattacks start with a phishing scheme, including Multi-Factor Authentication (MFA) attacks. While MFA provides IBM i login security, traditional MFA isn’t an airtight defensive system against unauthorized logins.
In this webinar we present the Four Best Practices & Advanced Techniques for IBM i MFA including:
- New MFA requirements effective in 2024 & beyond
- Additional MFA verification factors using geolocation, IP addresses and behavioral patterns for tighter login security
- Using phishing-resistant MFA & password-less MFA to immunize system logins against phishing attacks
- Integrating MFA into other security environments, including zero trust architectures, self-service password resets, emergency authorization solutions, SIEM systems & more
Register today and learn about the exciting changes IBM i organizations may soon have to implement in their MFA solutions.
Our Speaker
Ken McCalister
Ken McCalister has spent 35 years working with IBM i technology. Ken has vast experience working in all aspects of digital technology and management, including Administration, Engineering & Security. Ken is part of the IBM i Technical Team at Seasoft, providing support to its many diverse clients