Expert Tips for Securing AIX Systems: Controlling User Access

On-Demand Webinar

Expert Tips for Securing AIX Systems: Controlling User Access

AIX
Recorded:
January 25, 2018

 

Servers running AIX are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes makes attacking your infrastructure easier.

One of the most serious mistakes is failing to create and implement a well-defined security policy. Many compliance mandates like Sarbanes-Oxley (SOX) and HIPAA require your organization to have such a policy in place.

A written plan of how your organization intends to protect its IT assets is the most effective way to address security issues created by new technologies like mobile devices and cloud enablement. Without such a policy, it’s very difficult to ensure you have appropriate controls in place to protect mission-critical data.

But how do you even begin creating and implementing an AIX security policy if you’re not an expert on AIX security?

Watch this webinar—the first in our series on creating effective security policies and avoiding AIX security mistakes. Security expert Bob Erdman will explain the most important issues to consider when setting an AIX security policy to control user access:

  • Securing front door access to your systems
  • Setting strong password policies
  • Locking down root and privileged user access rights
  • Tightening up your user accounts
  • How to initially assess and then continuously monitor your AIX system’s security settings

Watch today to start improving your AIX security posture.

Evaluate Your AIX Security Settings for Free

Misconfigured settings leave data vulnerable. Find out how your systems compare to security best practices with a free Security Scan.