Discussion: Preventing IBM i data theft

ITKE Rich Loeber, Contributor Profile: ITKE
Tags:
Firewalls
IBM i
A firewall should be the first line of defense to protect your IBM i system, but not the only security measure you take. Rich Loeber counsels you to not ignore the enemy within. Build strong object level controls and restrict *ALLJOB access.

2 Comments on this article

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Saichandrasekar
    can any one share the document for configuring SFTP in ibm i7.1, Im expecting a document to cover import public key into ibm i7.1 server
    10 pointsBadges:
    report
  • NotSoIBMguru
    I think the document you want to is DCM (Digital Certificate Manager) this it the process you would use to import a Certificate. I hope this helps. http://www-01.ibm.com/support/knowledgecenter/ssw_ibm_i_71/rzahu/rzahudcmintaccessscen.htm
15 pointsBadges:
report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following