On-Demand Webinar

Are IBM i monitoring limitations leaving your data exposed?



In this 30-minute webinar we explore the key reasons why, in this era of cyberattacks, IBM i limitations could leave data vulnerable:

• Standard system audit settings don’t provide sufficient auditing of object or field level changes
• IBM i users with limited technical knowhow could alter data with tools like Excel without being tracked
• There is no built-in method to monitor activity on IBM i once users enters the SQL environment 

We will introduce you to a solution that resolves these issues, Powertech Database Monitor for IBM i [formerly DataThread], and give a 10-minute demonstration.

No transcript is available at this time.

Stay up to date on what matters.