Loading…
Wednesday, June 20 • 08:00 - 09:00
Authority Collection on IBM i 7.3

Sign up or log in to save this to your schedule and see who's attending!

Feedback form is now closed.
A shiny security gem was added to the IBM i operating system in IBM i 7.3, known as Authority Collection.This patented support is built into IBM i and can be leveraged by IBM i clients to do the following:1. Identify excess authority in such a manner that access to data can be reduced without the fear of breaking applications. Benefit to you"¦ Reducing excess authority == Reduced Risk2. Enable solution providers with a precise approach for understanding the source of authorization failures.Benefit to you"¦ Productivity boost3. Train your IBM i Security team. Don"t guess and don"t struggle. Use this technology to learn how to deploy security on IBM i.Benefit to you"¦ Improved Security knowledge and deployment

Speakers
avatar for Scott Forstie

Scott Forstie

Db2 for i Business Architect, IBM
Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. | He has worked on IBM operating system development since joining IBM in 1989. | | Scott is a frequently published author, speaker at... Read More →


Wednesday June 20, 2018 08:00 - 09:00
Orchidea B

Attendees (5)