Well-known services like FTP and ODBC allow users to access sensitive data without oversight or restrictions. Watch this lesson to learn how you can use exit points and exit programs to gain control over who can access your IBM i objects and how. The full lesson is presented in an hour-long webinar that you can watch at your own convenience.
Get Started
Find the security vulnerabilities on your IBM i and get recommendations for fixing them with a free Security Scan.