Loading…
Tuesday, May 5 • 10:00am - 11:00am
5 Tips for Monitoring & Securing Remote Access to the IBM i

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

When enabling staff to work and access the IBM i remotely, it’s important for organizations to keep two objectives in mind. First, ensuring that they can effectively secure and monitor the IBM i, in order to maintain business process continuity. At the same time, it's essential to make sure they are able to secure, monitor, and report on all the ongoing remote activity on the system.

Watch as we discuss best practices for monitoring and securing remote access on the IBM i. We’ll cover the key areas companies should be considering when providing staff with the ability to access the system and perform work remotely. Utilizing these tools and methods will help to ensure security on the IBM i, and prevent unauthorized access to the system. This session will appear in the virtual expo.

In this video we’ll discuss:

• Considerations for security when monitoring IBM i remote activity, specifically when users with higher/special authorities are connecting into your systems via VPN or foreign devices.
• Restricting and allowing access to consultants, temporary staff, etc.
• Tips for planning & automating access requests
• Identifying and implementing controls to protect your systems during times when your staff is spread thin.

Speakers
avatar for Joy Bonsignore

Joy Bonsignore

Senior IBM i Technical Sales & Support Engineer, Software Engineering of America
Senior IBM i Technical Sales & Support Engineer at Software Engineer of America (SEA)


Tuesday May 5, 2020 10:00am - 11:00am CDT
TBA