Your IBM i is highly securable, but many systems are left in a dangerously unprotected configuration. Figuring out how to begin protecting mission-critical data and applications can be a challenge.
The world’s top IBM i security experts have joined forces to help IT professionals like you better understand how to use this platform’s powerful security controls. Join this e-course to learn how to address six critical areas of IBM i security:
- System Values
- Event Auditing
- PC Access
- User Privileges
- Integrated File System (IFS)
- Object Authority
For each lesson, you’ll received an email that includes a link to the video presentation, notes summarizing the material covered, and links to additional resources. Sign up today to get started with IBM i security!