Loading…
Attending this event?
Experience the magic of education. 
Tuesday, May 21 • 8:00am - 9:00am
Controlling Access to IBM i Systems and Data

Log in to save this to your schedule and see who's attending!

To protect your critical data from access by unauthorized users or intruders, and to comply with increasingly strict IT security regulations, you must take control of all access points to your IBM i server. Attend this session for an in-depth discussion of all the points of access that must be managed and how they can be secured using IBM i exit points.

Learning Objectives:

• Securing network access and communication ports
• How database access via open-source protocols can be secured
• Taking control of command execution

Speakers
avatar for Guy Marmorat

Guy Marmorat

Senior Director of Product Management, Syncsort
For more than 20 years, Guy Marmorat has been dedicated to the development of security solutions for IBM i (AS/400). As President and CEO of Cilasoft, he contributed to positioning the company as a world leader in IBM i audit and security software. Guy joined Syncsort at the end of... Read More →
avatar for Jeffrey Uehling

Jeffrey Uehling

Product Management Director, Syncsort
Jeff Uehling is currently a Product Management Director at Syncsort, working directly with the Syncsort security product suite.  Jeff has over 30 years of experience working in security technology for the IBM i, and predecessor systems.Jeff previously worked in the IBM i OS development... Read More →


Tuesday May 21, 2019 8:00am - 9:00am
Fantasy Tower Monorail A-B

Twitter Feed