sea white-space

On-Demand Webinar

Four Best Practices & Advanced Techniques for IBM i MFA

More than 80% of cyberattacks start with a phishing scheme, including Multi-Factor Authentication (MFA) attacks. While MFA provides IBM i login security, traditional MFA isn’t an airtight defensive system against unauthorized logins.

In this webinar we present the Four Best Practices & Advanced Techniques for IBM i MFA including: 

  • New MFA requirements effective in 2024 & beyond 
  • Additional MFA verification factors using geolocation, IP addresses and behavioral patterns for tighter login security 
  • Using phishing-resistant MFA & password-less MFA to immunize system logins against phishing attacks  
  • Integrating MFA into other security environments, including zero trust architectures, self-service password resets, emergency authorization solutions, SIEM systems & more 

Register today and learn about the exciting changes IBM i organizations may soon have to implement in their MFA solutions. 

Our Speaker

Ken_McCalister-1-modified

Ken McCalister

Ken McCalister has spent 35 years working with IBM i technology. Ken has vast experience working in all aspects of digital technology and management, including Administration, Engineering & Security. Ken is part of the IBM i Technical Team at Seasoft, providing support to its many diverse clients