As Client Access has gone out of service and organizations continue to move to using Access Client Solutions (ACS), many IT pros are asking questions about ACS deployment:
Can features be limited? Can we customize the deployment so that administrators receive all features and everyone else receives limited features? How can ACS be deployed so users can’t change the configuration?
Watch IBM i pros Steve Sisk and Amy Williams demonstrate the ACS deployment process and answer these and other questions about securely deploying ACS.
Get Expert Tips for Secure ACS Deployment
Learn more about the security considerations for ACS and get expert guidance on how to address them.