Are IBM i monitoring limitations leaving your data exposed?

On-Demand Webinar

Are IBM i monitoring limitations leaving your data exposed?

IBM i

 

In this 30-minute webinar we explore the key reasons why, in this era of cyberattacks, IBM i limitations could leave data vulnerable:

• Standard system audit settings don’t provide sufficient auditing of object or field level changes
• IBM i users with limited technical knowhow could alter data with tools like Excel without being tracked
• There is no built-in method to monitor activity on IBM i once users enters the SQL environment 

We will introduce you to a solution that resolves these issues, PowerTech DataThread, and give a 10-minute demonstration.

No transcript is available at this time.