Project Management

Securing and Controlling Your Powerful Users

Vendor registration required

Executive Summary

One of the greatest challenges that an organization faces when securing an IBM i environment is protecting the system from the very people who are also charged with its care: programmers, administrators, and security officers. While these power users often need access to restricted objects and commands, they rarely need that level of access 24 hours a day, and definitely not without accountability. The attendee of this webcast will learn about the vulnerabilities associated with powerful users. The attendee will also discover Authority Broker, an award winning approach to regaining the control that the auditors demand, while still allowing the administrators and programmers to do their jobs.

  • Format: Webcast
  • Size: 0 KB