Controlling Insider Threats on IBM i

On-Demand Webinar

Controlling Insider Threats on IBM i

Secure your system by managing user IDs and access to sensitive data
IBM i
Recorded:
February 22, 2017

 

Let’s face facts: servers don’t hack other servers. Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.

User profiles are often duplicated or restored and are rarely reviewed for the appropriateness of their current configuration. This increases the risk of the profile being able to access data without the intended authority or having privileges that should be reserved for administrators.

Watch noted security expert Robin Tatam as he discusses a new approach for onboarding new users on IBM i and best-practices techniques for managing and monitoring activities after they sign on.

Find the Insider Threats on Your System

Identify the insider threats on your system and get expert tips for closing these security gaps. Request your free Security Scan today.