Essential Layers of IBM i Security: Security Monitoring and Auditing

Taking a holistic view of your security profile is critical to success. Grouping together security best practices and technologies into six primary layers, where each layer overlaps with the others, provides multiple lines of defense. Should one security layer be compromised, there’s a good chance that another layer will thwart a would-be intruder.

Our final webinar in this series focuses on monitoring the IBM i and automatically alerting administrators and security officers whenever suspicious activity is detected, as well as logging all security-related events for the purposes of tracking and auditing.

Essential Layers of IBM i Security - Security Monitoring and Auditing
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.