Modern interfaces like FTP and ODBC completely bypass menu security, often allowing end users to view, update, and delete data in the database without the restrictions and auditing supplied by the application.
Unfortunately, the vast majority of IBM i organizations still rely on menu security to protect their data.
Learning about the power and openness of these interfaces is critical for ensuring the integrity of the server’s application data. It’s also an essential step in complying with all formal regulations, including SOX, PCI, and HIPAA.
Join this informative webinar to learn how to close the “back doors” not covered by traditional security schemes. IBM i security expert Robin Tatam will explain exit point security and why this little-understood topic is so important to IBM i organizations.
You’ll also see a short demonstration of how to implement policies that restrict access to only those users who need it.