1988 was a banner year: Rain Man in the box office, Rick Astley on the charts, and IBM’s introduction of one of the most popular business computing systems: the AS/400.
In the 30 years that have since passed, the AS/400 has changed its name (more than once!) and the latest iteration of the Power Systems server and its IBM i operating system are exponentially more powerful than anything we dreamed of three decades ago.
Internet connectivity, virtualization, and open-source applications served in the cloud have cranked up productivity—and they’ve exposed our data and systems to risks we barely could have imagined as we excitedly unwrapped our blazing 3477 twinax terminals.
Sadly, many IBM i pros still rely on totally bogus security implementations that barely progressed into the era of grunge, putting their employers, their mission-critical data, and their own careers in imminent danger.
Join security expert Robin Tatam and IBM i veteran Trevor Perry for a discussion about:
- AS/400 or IBM i . . . isn’t it all the same thing?
- What organizations tend to forget about security
- Who’s responsible for data protection?
- If it ain’t broke, don’t fix it
- Steps you can take to secure your systems
Don't miss this chance to learn how to use the power of IBM i to combat cyber threats of the digital age.
Check Your IBM i for Vulnerabilities
Identify the vulnerabilities putting your IBM i at risk and learn how to fix them. Schedule a Security Scan today.