Getting Started with IBM i Security: Object Authority

On-Demand Webinar

Getting Started with IBM i Security: Object Authority

Learn best practices for controlling access to data and programs
IBM i
Recorded:
July 11, 2018

 

Experts’ fears surrounding the risks associated with poor configuration were recently confirmed by the 2018 State of IBM i Security Study. Published annually, the results reveal most Power Systems lack adequate security controls and auditing measures.

In this fast-paced webinar series, leading experts Robin Tatam and Carol Woodbury share insight into critical areas of IBM i security.

This final session of the series is presented by Carol Woodbury. She explains object authority and why default authority values constitute a security gap. You’ll learn best practice principles for controlling access to data and programs.

Get Started

Find the security vulnerabilities on your IBM i and get recommendations for fixing them with a free Security Scan.