
On Demand Webinar
5 Key Strategies for Managing IBM i Security with Exit Points
IBM i exit points are a critical, misunderstood security function that enable custom-written access & control programs to launch while users are accessing IBM i system features, such as FTP, ODBC, SQL, executing remote commands, 5250 sign-on and accessing the IFS.
In this webinar, we discuss how exit points enhance and automate IBM i security by:
- Discussing what IBM i exit points are, how they work and why they're critical to IBM i security and audit reporting
- Controlling user access permissions (read, write, delete, rename, run) and protecting native IBM i objects and the IFS
- Securing open communication ports, locking down TCP/IP application functions and preventing unauthorized command usage
- The Exit Point GPS: Finding the exit point you need and creating exit point programs
- Exit point activation: Do-it-yourself exit point activation versus using third-party solutions
This webinar provides you with the background & key strategies needed for using exit points to protect your own IBM i system.
Our Speaker
Ken McCalister
Ken McCalister has spent 35 years working with IBM i technology. Ken has vast experience working in all aspects of digital technology and management, including Administration, Engineering & Security. Ken is part of the IBM i Technical Team at Seasoft, providing support to its many diverse clients.
