Top Ten Settings that Leave your IBM i Vulnerable

Learn how your IBM i configuration can prevent common security exposures

Contrary to popular belief, IBM i is NOT secure by default. Thankfully, it IS secure-able.

View this on-demand webinar to explore the top configuration settings that leave your IBM i vulnerable – to accidental misconfiguration, being infected with malware (including ransomware), an outside attacker, or an ill-intentioned insider.

During this webinar, Carol Woodbury, President and CTO of DXR Security describes the vulnerability, provides considerations prior to changing settings, and high-level instructions for eliminating each vulnerability.

Top Ten Settings That Leave Your IBM i Vulnerable
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.