Security at the object level determines whether an IBM i user has permission to access, change, or even delete an object. But object-level security is challenging to implement and maintain. On many systems, object security isn’t fully configured or isn’t configured at all, leaving sensitive data vulnerable.
In this 2-part webinar, IBM i security expert Robin Tatam takes a deep dive into the concept of object security. You’ll learn:
How object authorities work on IBM i
The easiest way to implement object authority
Shortcomings of object-level security—and how to overcome them
These sessions are packed with tips and tricks that no IBM i pro should miss!
Check Your IBM i Security for Free
Find out where your systems are secure and where they could be vulnerable with a free IBM i Security Scan.