Your IBM i is highly securable, but many systems are left in a dangerously unprotected configuration. Figuring out how to begin protecting mission-critical data and applications can be a challenge.
The world’s top IBM i security experts have joined forces to help IT professionals like you better understand how to use this platform’s powerful security controls. Join this e-course to learn how to address six critical areas of IBM i security:
- System Values
- Event Auditing
- PC Access
- User Privileges
- Integrated File System (IFS)
- Object Authority
For each lesson, you’ll receive an email that includes a link to the video presentation, notes summarizing the material covered, and links to additional resources. Sign up today to get started with IBM i security!
There’s a limited pool of resources in the marketplace with real IBM i security knowledge. So, we look to Powertech’s experience—that’s their real value. Anyone can provide a toolbox and a set of tools, but we need to know the risk of change and how to mitigate it. It’s all about expertise, and Powertech is simply the best at what they do.
CIO and CISO, Seneca Gaming Corporation