IBM i exit points allow custom-written programs to launch when users access system functions, such as FTP, ODBC, executing remote commands, 5250 sign-on and accessing the IFS.
Exit point programs can allow or deny access, log activity, impose additional security restrictions, alert staff, and perform other desired functions.
In this webinar, we'll explore how iSecurity Firewall can enhance and automate IBM i exit point security, including:
- What IBM i exit points are, how they work, and why they’re important to IBM i security and audit reporting
- Why exit points, appliance firewalls and menu security aren’t enough to completely secure IBM i installations from remote & local users
- How iSecurity Firewall enhances IBM i exit point security by providing complete user access control (read, write, delete, rename, run) and protection for IBM i objects and IFS files
- How to easily configure and report on exit point activity for security and auditing needs