On-Demand Webinar

Lessons Learned from the AS/400 Breach

Find out how hackers exploited a misconfigured IBM i system


Get actionable info to avoid becoming the next cyberattack victim.

In “Data breach digest—Scenarios from the field,” Verizon documented an AS/400 security breach. Whether you call it AS/400, iSeries, or IBM i, you now have proof that the system has been breached.

Watch IBM i security expert Robin Tatam offer insight into the issues surrounding this specific scenario.

Robin also draws on his extensive cybersecurity experience to discuss policies, processes, and configuration details that you can implement to help reduce the risk of your system being the next victim of an attack.

Find Your Vulnerabilities Before Attackers Do

Find the security vulnerabilities on your IBM i and get recommendations for fixing them with a free Security Scan.