Previous Webinar:

Top 5 Security Threats To IBM i And How To Avoid Them

Although the IBM i platform could be considered the most securable platform in any business or organization, many still haven't fully taken advantage of this incredible technological feature. Follow along as we outline 5 critical risks to your IBM i environment, as well as what you can do to avoid them.

In our Webinar, we intend to shed some light on:

  • Operator errors and interactions that impact the IBM i security setup 

  • Users with too much authority that can interact with data that is meant to be secure.

  • The risk involved with remote access to the IBM i

  • Monitoring local activity - Leverage QAUDJRN to monitor activity that can impact business critical data

  • Protecting the IFS -  Enforcing a common sense security policy for the IFS

View The Recording
First Name
Last Name

About Our Speaker

Lloyd Ramdarie

Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His background includes working in IBM i space for quite a number years with a large extent of his experience coming from heavy involvement with securing the IBM i. He is a seasoned IT professional who can utilize his vast experiences
and expertise to help you implement the very best end to end security solutions in the IBM i environment.

© 2020 Software Engineering of America