Essential Layers of IBM i Security: System-Access Security
Taking a holistic view of your security profile is critical to success. Grouping together security best practices and technologies into six primary layers, where each layer overlaps with the others, provides multiple lines of defense. Should one security layer be compromised, there’s a good chance that another layer will thwart a would-be intruder.
In part 4 of our 6-part webinar series on the essential layers of IBM i security we discuss how to better understand the strategies and tactics to keep unauthorized users out of your IBM i and maintain tight controls over what authorized users can do once logged in.