Close
  • Take IBM i Security data and reports and turn it into valuable information
  • Determine which devices are connecting to/from the IBM i
  • Identify which TCP servers are active and which functions they are performing
  • Discover what objects are being remotely accessed
  • Understand why OS400’s QAUDJRN is so huge

To view this webinar on demand, please fill out and submit the form below:

Easily Identify 5 IBM i Security & Data Issues

in under 15 minutes!

In this webinar we will discuss:

Most organizations have automated the creation of a significant number of reports for auditing and monitoring security activity on the IBM i. However, most companies often struggle with being able to analyze all this data.


Mel Zucker, SEA's Senior IBM i solutions engineer, demonstrates how to use iSecurity's Visualizer Business Intelligence tool to identify five common security and data issues on the IBM i in under 15 minutes.

IBM i Webinar Series