Getting Started with IBM i Multi-Factor Authentication
Thursday, October 13th, 2 PM ET/11 AM PT
How do you implement Multi-Factor Authentication (MFA) user verification on your IBM i systems?
MFA access has become a foundational component of many organizations’ identity and access management (IAM) strategies. MFA usage is now mandated by many industries, regulatory standards, governments and insurance companies.
For many IBM i organizations, MFA sign on protection isn’t a nice-to-have feature. It’s a must-have requirement.
Join SEA on October 13th where we’ll show you how to evaluate & implement MFA user verification on IBM i servers, including:
- How does MFA reduce unauthorized IBM i signons & meet compliance standards?
- What software & services are necessary for IBM i MFA?
- Considerations and best practices for implementing MFA for IBM i access
Join SEA on Thursday, October 13th, to learn more about how to protect your IBM i systems using MFA.
Who should attend: Corporate decisions makers responsible for recommending, approving, purchasing and implementing MFA access for IBM i systems.
Ken McCalister has spent 35 years working with IBM i technology . Ken has vast experience working in all aspects of digital technology and management, including Administration, Engineering & Security. Ken is part of the IBM i Technical Team at Seasoft providing support to its many diverse clients.