IBM i provides many options for securing the system and/or the data. Some, like working with user profiles, object authorities, and system values are obvious. Others … not so much.
During this session, IBM i security expert Carol Woodbury explores some of the more obscure features of IBM i security—such as using the audit journal to determine whether sessions are encrypted, securing DDM, using an authorization list to prevent access to /QSYS.LIB, and more.
You don't want to miss this far-reaching discussion!
Find out where your systems are secure and where they might be vulnerable with a free IBM i Security Scan. You'll get answers to your biggest IBM i security questions, plus expert tips for prioritizing corrective action.