View analytic
Wednesday, June 20 • 08:00 - 09:00
Authority Collection on IBM i 7.3

Sign up or log in to save this to your schedule and see who's attending!

Feedback form is now closed.
A shiny security gem was added to the IBM i operating system in IBM i 7.3, known as Authority Collection.This patented support is built into IBM i and can be leveraged by IBM i clients to do the following:1. Identify excess authority in such a manner that access to data can be reduced without the fear of breaking applications. Benefit to you"¦ Reducing excess authority == Reduced Risk2. Enable solution providers with a precise approach for understanding the source of authorization failures.Benefit to you"¦ Productivity boost3. Train your IBM i Security team. Don"t guess and don"t struggle. Use this technology to learn how to deploy security on IBM i.Benefit to you"¦ Improved Security knowledge and deployment

avatar for Scott Forstie

Scott Forstie

Db2 for i Business Architect, IBM
I like to cook, run and have fun.

Wednesday June 20, 2018 08:00 - 09:00
Orchidea B

Attendees (5)