One of the key elements of IBM i security auditing is remaining compliant with both industry-specific regulations and corporate policies. In order to avoid compliance issues, security risks and potential security audit failures, it’s important to periodically review and adjust your auditing protocols on the IBM i.
Watch our previously recorded webinar, wherein we provide an introduction into Auditing & Compliance on the IBM i. In this webinar we will review the 4 pillars involved when auditing your IBM i system in order to remain compliant with any of the regulations that your company is subject to: access, security, change management and backup.
In this webinar we’ll explain how to:
• Generate reports over user access and database activity
• Secure your IBM i when breaches or exceptions occur
• Efficiently document and track changes
• Set up backup/recovery tools for auditing requirements