IBM i Security in 30 Minutes: All About Exit Programs

On-Demand Webinar

IBM i Security in 30 Minutes: All About Exit Programs

If you can only do one thing to secure IBM i, here's where you start
IBM i
Recorded:
December 8th, 2016

 

One of the biggest risks to IBM i comes from access that originates outside of the approved application. Users typically have the ability to copy (download) as well as alter data through powerful desktop tools like MS Excel, and can even run server commands!

Unfortunately, for the majority of shops, this happens without restriction and without an audit trail. 

In this fast-paced webinar, security guru Robin Tatam shares expert insight into several “quick win” areas of IBM i security.

During this 30-minute educational quick tip, learn five important aspects of how exit programs contribute to security:

  • What actually is an exit point?
  • How do I know if I already have exit programs?
  • Who should use exit programs?
  • Will an exit program magically make the server more secure?
  • How will deploying exit programs reduce risk?
Start Securing Your Exit Points

Get more details about how you can achieve an IBM i security "quick win" by securing your exit points. Request your customized Network Security demo today.