sea white-space

On-Demand Webinar

Top 5 Security Threats To IBM i & How To Avoid Them

Although the IBM i platform could be considered the most securable platform in any business or organization, many still haven't fully taken advantage of this incredible technological feature. Follow along as we outline 5 critical risks to your IBM i environment, as well as what you can do to avoid them.

In our Webinar, we intend to shed some light on:

  • Operator errors and interactions that impact the IBM i security setup 

  • Users with too much authority that can interact with data that is meant to be secure.

  • The risk involved with remote access to the IBM i

  • Monitoring local activity - Leverage QAUDJRN to monitor activity that can impact business critical data

  • Protecting the IFS -  Enforcing a common sense security policy for the IFS

Our Speaker

Lloyd Ramdarie head shot

Lloyd Ramdarie

Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His background includes working in IBM i space for quite a number years with a large extent of his experience coming from heavy involvement with securing the IBM i. He is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end to end security solutions in the IBM i environment.