Presentation Detail

Select Presentation  

TitleIBM i Security: The Good, the Bad, and the Ugly
SpeakerRobin Tatam
PresentedFebruary 18, 2015
DescriptionDont miss more than a decades worth of research on the security configurations of IBM-i based servers and the successes and failures of organizations that run critical applications on them .PowerTech has audited thousands of IBM i servers around the world, gaining extensive, real-world insight into the deployment state of IBM i security controls. Join me for a recap of eye-opening statistics from this wildly popular study: The State of IBM i Security. Along with the results, this session provides a review of six configuration categories:
* Network-initiated commands & data access
* Server-level security controls
* Profile and password settings
* Administrative capabilities
* Public accessibility to corporate data
* System event auditing
Learn what steps your own organization must take to address these continually overlooked and dangerous security exposures
Home Page