On Demand Webinar
4 Best Practices for Future-Proofing IBM i MFA
Multi-factor authentication (MFA) systems, while a valuable security measure, are not without vulnerabilities. Phishing attacks, SIM swapping, man-in-the-middle attacks, MFA fatigue, and more can still compromise logins.
Watch this on-demand webinar to discover how to future-proof your IBM i MFA systems. We delve into strategies and tactics to enhance IBM i login protection and defend against emerging threats.
Further discussion topics include:
- Patching IBM i MFA vulnerabilities: Utilizing encryption to bolster MFA security.
- Immunizing logins against phishing: Exploring phishing-resistant MFA and password-less MFA options.
- Integrating MFA into other IBM i functions: Enhancing self-service password resets and emergency authorization solutions.
- Strengthening authentication security: Leveraging hard-to-break MFA verification factors.
Speakers
Ken McCalister
Ken McCalister has spent 35 years working with IBM i technology. Ken has a vast experience working in all aspects of digital technology and management including administration, engineering, and security.
Ken is part of the IBM i Technical Team at Software Engineering of America, providing ongoing support to its many diverse clients.
Lloyd Ramdarie
Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years, with heavy involvement in securing the IBM i.
Lloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.