Hands up everyone who has heard – or even shared - the assertion that IBM i is one of the most secure systems available. Wow, that’s virtually all of you! Unfortunately, that claim comes with a HUGE disclaimer regarding knowledge and effort that most of us prefer to ignore. Of course, security, and it’s regulatory companion, compliance, are both highly-desirable states but what does it really mean to achieve it? Does it involve the OS, your application providers, or just your perimeter firewall? IBM has been steadily adding security-related features with each new OS release but most of us still rely heavily on the simple menu system that we wrote in 1992 to protect our most critical data. It’s time that we “modernize” our approach to IBM i security in the same way we are modernizing our applications so let’s talk about what needs to be tackled when locking things down and how can we avoid breaking the good stuff in the process.
This panel is ready to dispel the myths, disclose the realities, and discuss how to keep your company out of the spotlight.
Got a question to ask during the panel?
Submit Now This is Session ID:180244