15-Minute Webcast: Taking Control of Access to Your IBM i Systems and Data

Posted on August 1, 2018

by QCM-Technologies

  IBM i Security Webcast Series – Join Us for this 15-minute Webcast

Learn how exit points provided by the IBM i OS can be used to monitor and secure access to IBM i systems and data.

About this event

Monday, 8/06/2018 at 1:30 PM EDT

The days when the IBM i was isolated from other systems and configuring security was a relatively simple matter are long gone. As the IBM i has become interconnected with other systems, the way in which it can be accessed have grown – and the task of protecting it from intrusion has become more complex.

To ensure the security of your organization’s critical data and applications, and to comply with increasingly strict IT security regulations, you must control the numerous means by which your IBM i systems can be accessed.

Watch this 15-minute webcast to learn how exit points provided by the IBM i OS can be used to monitor and secure access to IBM i systems and data. During this webcast you’ll learn more about:

  • Securing network access and communication ports
  • Securing database access
  • Securing access to commands
  • Tradeoffs between do-it-yourself and third-party solutions

REGISTER TO WATCH HERE

Source: Syncsort

QCM Technologies is a proud partner

LOGO_Syncsort

 

 

 

 

 

 

DISCOVER A SMARTER SOLUTION TODAY

Events + Press

Blogs

Case Studies

Research Downloads

Videos

Industry News