How to Keep Your IBM i Secure as Technology Accelerates

On-Demand Webinar

How to Keep Your IBM i Secure as Technology Accelerates

IBM i

 

Keeping your IBM i secure in the ever-changing world of Internet technology requires constant diligence. You may believe you locked down your network a few years ago—or that your IBM i (AS/400, iSeries) systems are totally insulated from the Internet—but that brief timespan is a lifetime on the Internet.

New Technology, New Security Risks

Disruptive new technologies abound: cloud services, the Internet of Things (IoT), big-data aggregation, and new development platforms like node.js. With these come a host of fresh vulnerabilities: ransomware, session hijacking, malicious sensor data, encrypted transaction flaws, and new denial of service attacks. Unless you’ve added protection for these, your IBM i is likely exposed.

Contrary to popular belief, the IBM i is not an obscure backwater on the Internet. Its excellent internal security and legendary reliability make it a solid platform for integrating new Internet technologies with legacy business processes in industries such as healthcare, finance, manufacturing, and distribution.

Join IT industry expert Mel Beckmand and IBM i security pro  Robin Tatam for a discussion about state-of-the-art tools you can use to protect your IBM i, including:

  • Automated vulnerability assessment (VA)
  • Intrusion detection and prevention systems (IDS/IPS)
  • Security information and event management (SIEM)
  • Configuration audit and change management systems

 

Get Started

Get a quick snapshot of your IBM i security posture and learn how to reduce risks to your business-critical data.