Top 5 Security Threats To IBM i & How To Avoid Them
Although the IBM i platform could be considered the most securable platform in any business or organization, many still haven't fully taken advantage of this incredible technological feature. Follow along as we outline 5 critical risks to your IBM i environment, as well as what you can do to avoid them.
In our Webinar, we intend to shed some light on:
Operator errors and interactions that impact the IBM i security setup
Users with too much authority that can interact with data that is meant to be secure.
The risk involved with remote access to the IBM i
Monitoring local activity - Leverage QAUDJRN to monitor activity that can impact business critical data
Protecting the IFS - Enforcing a common sense security policy for the IFS
Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His background includes working in IBM i space for quite a number years with a large extent of his experience coming from heavy involvement with securing the IBM i. He is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end to end security solutions in the IBM i environment.