Experts' fears surrounding the risks associated with poor configuration were recently confirmed by the 2017 State of IBM i Security Study. Published annually, the results reveal most Power Systems lack adequate security controls and auditing measures.
In this fast-paced webinar series, leading experts Robin Tatam, Carol Woodbury, and Sandi Moore share insight into critical areas of IBM i security.
Carol Woodbury, author of IBM i Security: Administration and Compliance, opens the series with an introduction to security-relevant system values.
System values are one of the fundamental elements of IBM i security. The security system values enable you to “set the tone” of security on your IBM i, enforce password composition rules, and enable auditing. In this on-demand event, watch as she describes these system values and provides guidance on their best practice settings.
It's not too late to sign up for the remaining webinars in this informative series, register today!
Find the security vulnerabilities on your IBM i and get recommendations for fixing them with a free Security Scan.