Ask any security professional which area of IBM i security is most often ignored and chances are the unanimous response is a chorus of “the Integrated File System.”
Many organizations are either unaware of the risks that an unsecured IFS poses or are simply unsure of how to secure it. Regardless of the reason, this is a problem. The system interface doesn’t differentiate how a user profile accesses data – which leaves sensitive data exposed and vulnerable to manipulation, malware, and even theft.
IBM i security expert Sandi Moore goes in depth on how to achieve a successful IFS security strategy. Topics will include:
- What the IFS is and where it is vulnerable
- The risks of ignoring IFS security
- How to secure the IFS and what you need in order to do so
Don’t miss this chance to learn how to close one of the most overlooked security gaps on the IBM i!
Get Started
Find the security vulnerabilities on your IBM i and get recommendations for fixing them with a free Security Scan.