Loading…
POWERUp 2019 has ended
Experience the magic of education. 
Tuesday, May 21 • 8:00am - 9:00am
31CF Controlling Access to IBM i Systems and Data

Log in to save this to your schedule, view media, leave feedback and see who's attending!

To protect your critical data from access by unauthorized users or intruders, and to comply with increasingly strict IT security regulations, you must take control of all access points to your IBM i server. Attend this session for an in-depth discussion of all the points of access that must be managed and how they can be secured using IBM i exit points.

Learning Objectives:

• Securing network access and communication ports
• How database access via open-source protocols can be secured
• Taking control of command execution

Speakers
avatar for Guy Marmorat

Guy Marmorat

IBM i Security Consultant, Resiliane
“For more than twenty years Guy Marmorat has been dedicated to the development of Security Solutions on IBM i (AS/400). He has played a key part in the development and success of Cilasoft, helping to make its software products part of the World-Leading Security and Auditing Suites... Read More →
avatar for Jeff Uehling

Jeff Uehling

IBM i Security Expert
Jeff Uehling is an independent consultant specializing in IBM i security. Prior to retiring from Syncsort, he worked for over 30 years at IBM where he served as lead architect for IBM i security technology. Jeff’s previous responsibilities at IBM included architecture, design and... Read More →


Tuesday May 21, 2019 8:00am - 9:00am PDT
Fantasy Tower Monorail A-B
  Security