Using Exit Points to Fortify Your IBM i Security
In the early days of the AS/400 and iSeries, the job of protecting the system was often as simple as managing user authorities and securing user access through menus. This is certainly no longer the case with today’s IBM i environments. Fully open to communicate with other systems across internal and external networks, and accessible […]