Infrastructure Protection & Data Security Solutions Protect business-critical data with automated security solutions that help you stay ahead of today's ever-changing threats.
On-Demand Webinar Getting Started with IBM i Security: User Privileges By Robin Tatam Get up to speed on special authorities, command line access, and auditing user activities
GoAnywhere Gateway Implement an extra layer of cybersecurity when exchanging files with trading partners.
Article Audit Tested & Audit Approved Instant Authority! By Robin Tatam on Fri, 03/24/2017 Introduced by IBM to support TCP/IP services, a profile swap allows a job to change midstream and run under a different profile than the one that started it.