Lock it Down: Access Control for IBM i

Logo
Presented by

Bill Hammond, Product Marketing Director, Precisely

About this talk

IBM i is securable BUT not secured by default. To help protect your organization from the increasing security threats, you must take control of all access points to your IBM i server. You can limit IBM i security threats by routinely assessing your risks and taking control of logon security, powerful authorities, and system access. With the right tools and process, you can assure comprehensive control of unauthorized access and can trace any activity, suspicious or otherwise, on your IBM i systems. Watch this webcast to learn: - How to secure network access and communication ports - How to implement different authentication options and tradeoffs - How to limit the number of privileged user accounts - How Precisely’s Assure Security can help
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (159)
Subscribers (10895)
Precisely is the global leader in data integrity, providing accuracy and consistency in data for 12,000 customers in more than 100 countries, including 90 percent of the Fortune 100. Precisely’s data integration, data quality, location intelligence, and data enrichment products power better business decisions to create better outcomes. Learn more at www.precisely.com