Top Ten Settings that Leave your IBM i Vulnerable
Learn how your IBM i configuration can prevent common security exposures
Contrary to popular belief, IBM i is NOT secure by default. Thankfully, it IS secure-able.
View this on-demand webinar to explore the top configuration settings that leave your IBM i vulnerable – to accidental misconfiguration, being infected with malware (including ransomware), an outside attacker, or an ill-intentioned insider.
During this webinar, Carol Woodbury, President and CTO of DXR Security describes the vulnerability, provides considerations prior to changing settings, and high-level instructions for eliminating each vulnerability.