In this 30-minute webinar we explore the key reasons why, in this era of cyberattacks, IBM i limitations could leave data vulnerable:
• Standard system audit settings don’t provide sufficient auditing of object or field level changes
• IBM i users with limited technical knowhow could alter data with tools like Excel without being tracked
• There is no built-in method to monitor activity on IBM i once users enters the SQL environment
We will introduce you to a solution that resolves these issues, Powertech Database Monitor for IBM i [formerly DataThread], and give a 10-minute demonstration.