Meeting Archive:
Expand Your Control of Access to IBM i Systems and Data

Meeting Description:


Controlling all the ways your company’s data is being accessed, especially given the proliferation of open source software and other non-traditional data-access methods, is critical to ensuring security and regulatory compliance. This webinar reviews the different ways your data can be accessed, discusses how exit points work and how they can be managed, and why a global data access control strategy is especially important to efficiently protect sensitive data against unwanted access.

Topics will include:

  • IBM i access methods and risks
  • Using exit programs to block traditional and modern access methods
  • Real life examples and perspectives


Date: Wed, Jul 17, 2019
Time: 11:00 AM EDT
Duration: 1 hour
Host(s): Syncsort