Four Powerful Ways to Use Exit Points for Securing IBM I Access

Syncsort

Today, the job of managing security on IBM i can be complicated, requiring dynamic technologies and processes that can respond quickly to ever-evolving threats and new regulations.

There are many different approaches and technologies you can use to keep your IBM i secure. In this whitepaper, we’ll discuss how numerous exit points provided by the IBM i OS can be utilized as a powerful means to monitor and secure four important levels of access within the IBM i:

  • Networks
  • Communication Ports
  • Databases
  • Commands
Published:
Lang:
Type: White Paper
Length:

Favourites

  • Favorite list is empty.
FavoriteLoadingClear favorites

Your favorite posts saved to your browsers cookies. If you clear cookies also favorite posts will be deleted.