POWERUp 2019 has ended
Experience the magic of education. 
Tuesday, May 21 • 8:00am - 9:00am
31CF Controlling Access to IBM i Systems and Data

Log in to save this to your schedule and see who's attending!

To protect your critical data from access by unauthorized users or intruders, and to comply with increasingly strict IT security regulations, you must take control of all access points to your IBM i server. Attend this session for an in-depth discussion of all the points of access that must be managed and how they can be secured using IBM i exit points.

Learning Objectives:

• Securing network access and communication ports
• How database access via open-source protocols can be secured
• Taking control of command execution

avatar for Guy Marmorat

Guy Marmorat

Senior Director of Product Management, Syncsort
For more than 20 years, Guy Marmorat has been dedicated to the development of security solutions for IBM i (AS/400). As President and CEO of Cilasoft, he contributed to positioning the company as a world leader in IBM i audit and security software. Guy joined Syncsort at the end of... Read More →
avatar for Jeffrey Uehling

Jeffrey Uehling

Syncsort Security Expert, Syncsort
Jeff Uehling has over 30 years of experience working in security technology for the IBM i, and its predecessor systems, and is an expert in the Syncsort’s security offerings. Jeff’s IBM experience includes working in the IBM i OS development group, specifically as lead architect... Read More →

Tuesday May 21, 2019 8:00am - 9:00am
Fantasy Tower Monorail A-B

Twitter Feed