Security expert Carol Woodbury gets tons of questions about IBM i security, including straight-forward questions about security concepts.
But some questions address the more obscure features and functions of IBM i security:
- What’s the difference between profile swap and program adopt?
- In what order does the system check authority?
- How can you use attributes of the output queue to avoid granting users *SPLCTL authority?
In this on-demand webinar, Carol will answer these and other questions about the most confusing aspects of IBM i security. Join us for information that will useful for both beginners and veterans.
When time and cybersecurity knowledge are in short supply, the HelpSystems security experts are here to assist with Managed Security Services.