Can We Secure Data Access?

Try Sequel today

Absolutely! Sequel conforms to the security you set up through your OS, or you can choose to use Sequel’s security. Objects are stored on the IBM i, giving IT the ability to control the way Sequel is accessed and used. You can use Sequel to enforce security by restricting users from libraries, files, fields, or rows. Plus, auditing options make it easy to track who is accessing information—and which information they are viewing.

Watch the short video above to learn about Sequel's security options. 

Try Sequel today.