A disturbing number of IBM i users can take action that would cause your CEO’s blood to boil, according the annual State of IBM i Security Study.
Power users might need access to restricted objects and commands some of the time, they rarely need that level of access 24 hours a day, and accountability is essential.
In this webinar, IBM i security expert Robin Tatam will explain the scope of the problem and how you can correct this vulnerability on your systems before any damage is done. He’ll also introduce an automated solution that balances your organization’s need for security and efficiency.
See how Authority Broker for IBM i can help you monitor and conrol privileged user activities on IBM i—without impeding productivity.