Getting Started with IBM i Security: Securing PC Access

On-Demand Webinar

Getting Started with IBM i Security: Securing PC Access

Protect your system from unauthorized network access through readily available PC tools
IBM i
Recorded:
June 20, 2018

 

Experts’ fears surrounding the risks associated with poor configuration were recently confirmed by the 2018 State of IBM i Security Study. Published annually, the results reveal most Power Systems lack adequate security controls and auditing measures.

In this fast-paced webinar series, leading experts Robin Tatam and Carol Woodbury share insight into critical areas of IBM i security.

This on-demand webinar will show you how well-known services like FTP and ODBC enable users to access sensitive data without oversight or restrictions. Robin Tatam will also explain exit point security, what exit programs are, and how you can protect your organization. 

Get Started

Find the security vulnerabilities on your IBM i and get recommendations for fixing them with a free Security Scan.