Security Weaknesses Affecting Many IBM i Systems
Security Weaknesses Affecting Many IBM i Systems

Find out how businesses from industries like insurance, finance, and manufacturing protect the mission-critical data stored on IBM i (System i, iSeries, AS/400). The 2016 State of IBM i Security Study reveals information from seven key audit areas:

  • Server-level security controls;
  • Profile and password settings;
  • Administrative capabilities;
  • Network-initiated commands and data access;
  • Public accessibility to corporate data;
  • System event auditing;
  • Virus protection.



Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.