One of the greatest challenges to securing any IBM i environment is protecting the system from the people charged with its care: programmers, administrators, and security officers.
These power users often need access to restricted objects and commands, but they rarely need that level of access 24 hours a day, and definitely not without accountability.
Watch this session to learn about the vulnerabilities associated with powerful users. Then, explore an award-winning approach to regaining the control your auditors demand while allowing your administrators and programmers to do their jobs.
This discussion will demonstrate a valuable enhancement to track users of hard-to-audit environments such as SQL, QShell, DFU, SEU, and SST.
Transcript not available at this time.