Resources & Events
Protect the IBM i Command Line with Command Security
A user’s ability to execute commands in a green-screen environment is controlled by the limit capabilities (LMTCPB) parameter on their profile. Although without exit programs to extend IBM i security functions, even limited capability users could invoke commands through network interfaces such as FTP.
Remember the IFS!
Ask any security professional which area of IBM i security is most often ignored and chances are that the unanimous response is a chorus of “the Integrated File System.” Although it’s been around since V3R1, the Integrated File System, or IFS, remains a shrouded mystery that represents significant risk to many IBM i organizations.
Find the security vulnerabilities on your IBM i and get recommendations for fixing them with a free Security Scan.
Eliminate the Most Common Cause of a Data Breach with Multi-Factor Authentication
Multi-factor authentication (MFA) protects you from the most common cause of a data breach: compromised user credentials. Join this live webinar to learn how MFA can protect your IBM i systems.