sea white-space

On Demand Webinar

4 Best Practices for Future-Proofing IBM i MFA

Multi-factor authentication (MFA) systems, while a valuable security measure, are not without vulnerabilities. Phishing attacks, SIM swapping, man-in-the-middle attacks, MFA fatigue, and more can still compromise logins.

Watch this on-demand webinar to discover how to future-proof your IBM i MFA systems. We delve into strategies and tactics to enhance IBM i login protection and defend against emerging threats. 

Further discussion topics include:

  • Patching IBM i MFA vulnerabilities: Utilizing encryption to bolster MFA security.
  • Immunizing logins against phishing: Exploring phishing-resistant MFA and password-less MFA options.
  • Integrating MFA into other IBM i functions: Enhancing self-service password resets and emergency authorization solutions.
  • Strengthening authentication security: Leveraging hard-to-break MFA verification factors.

Speakers

Ken_McCalister-1-modified

Ken McCalister

Ken McCalister has spent 35 years working with IBM i technology. Ken has a vast experience working in all aspects of digital technology and management including administration, engineering, and security.

Ken is part of the IBM i Technical Team at Software Engineering of America, providing ongoing support to its many diverse clients.

Lloyd Ramdarie head shot

Lloyd Ramdarie

Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years, with heavy involvement in securing the IBM i.

Lloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.