Security Considerations When Implementing and Using Access Client Solutions (ACS)

On-Demand Webinar

Security Considerations When Implementing and Using Access Client Solutions (ACS)

IBM i

 

Find out what ACS is, what security features are available, and why you should migrate from i Access

Because IBM i Access is not supported on Windows 10 clients, now is the time to migrate to Access Client Solutions (ACS), the strategic client solution provided by IBM.

In this recorded webinar, IBM i security expert Carol Woodbury and her guest, Tim Rowe of IBM, discuss ACS and related security considerations. You'll find out what ACS is and what security considerations you should be aware of during the initial deployment and configuration of ACS. 

Carol and Tim also discuss:

  • Benefits to the security administrator of using ACS (over IBM i Access)
  • Other security considerations when using ACS
  • Recent enhancements to ACS unrelated to security
Check Your System for Vulnerabilities

IBM i is one of the most securable servers on the market, but you have to take proactive steps to ensure it's properly configured. Find the vulnerabilities on your systems and get expert tips for strengthening your security posture with a free Security Scan.