• Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Special Offers
Business Intelligence Info
  • Business Intelligence
    • BI News and Info
    • Big Data
    • Mobile and Cloud
    • Self-Service BI
  • CRM
    • CRM News and Info
    • InfusionSoft
    • Microsoft Dynamics CRM
    • NetSuite
    • OnContact
    • Salesforce
    • Workbooks
  • Data Mining
    • Pentaho
    • Sisense
    • Tableau
    • TIBCO Spotfire
  • Data Warehousing
    • DWH News and Info
    • IBM DB2
    • Microsoft SQL Server
    • Oracle
    • Teradata
  • Predictive Analytics
    • FICO
    • KNIME
    • Mathematica
    • Matlab
    • Minitab
    • RapidMiner
    • Revolution
    • SAP
    • SAS/SPSS
  • Humor

IBM i Security – 6 super short webcasts to help protect your iSeries

October 14, 2018   Big Data
blog IBMi Security Webcasts IBM i Security – 6 super short webcasts to help protect your iSeries
Jamie Heckler avatar 1486569186 54x54 IBM i Security – 6 super short webcasts to help protect your iSeries

Jamie Heckler

October 13, 2018

Over the last several months, Syncsort has run a series of 15-minute webcasts covering various topics across the broad realm of IBM i security. This short format has proven to be quite popular with our audiences. See what tips our experts have to share in these six 15-minute recorded sessions.

webcast thumb 150x150 IBM i Security – 6 super short webcasts to help protect your iSeries

1. Accelerating Regulatory Compliance for IBM i Systems

Do you need to accelerate compliance for your IBM i systems? Whether it be for PCI, SOX, GDPR or other regulations, view this 15-minute webcast on-demand to learn more about the importance of security risk assessments for compliance, implementing compliance policies that align with regulations, and generating reports and alerts that flag compliance issues.Watch 15-minute webcast > 

webcast thumb 150x150 IBM i Security – 6 super short webcasts to help protect your iSeries

2. Assessing IBM i Security Risks

Are you concerned about the security of your IBM i, or its ability to pass your next compliance audit? This 15-minute webcast covers common IBM i vulnerabilities, key areas to examine as part of a security risk assessment, tradeoffs between in-house and third-party assessments, and going beyond assessment to remediation. Watch 15-minute webcast >

webcast thumb 150x150 IBM i Security – 6 super short webcasts to help protect your iSeries

3. Detecting Fraudulent Activity on Your IBM i

This 15-minute webcast can help you detect fraud on your IBM i series, covering key IBM i log files, identifying security incidents in log files, consolidating IBM i log information under a common strategy with other platforms, and tradeoffs between do-it-yourself and third-party solutions. Watch 15-minute webcast >

webcast thumb 150x150 IBM i Security – 6 super short webcasts to help protect your iSeries

4. Securing Sensitive IBM i Data At-Rest and In-Motion

View this 15-minute webcast on-demand and get up to speed on the key concepts you need to know to secure sensitive data on your IBM i servers, including topics such as FIELDPROC encryption and key management, tokenization & anonymization, tools for securing data in motion, and tradeoffs between do-it-yourself and third-party solutions. Watch 15-minute webcast >

webcast thumb 150x150 IBM i Security – 6 super short webcasts to help protect your iSeries

5. Securing IBM i User Profiles

Do the right people have the right level of access to your system? Learn how you can strengthen IBM i user profile security, meet audit and compliance requirements and more, including reducing powerful profiles, implementing multi-factor authentication, and enabling secure profile re-enablement and password self-service. Watch 15-minute webcast >

webcast thumb 150x150 IBM i Security – 6 super short webcasts to help protect your iSeries

6. Taking Control of Access to Your IBM i Systems and Data

View this 15-minute webcast to learn how exit points provided by the IBM i OS can be used to monitor and secure access to IBM i systems and data. During this webcast you’ll learn more about securing network access and communication ports, securing database access, and securing access to commands. Watch 15-minute webcast >

Learn Best Practices in IBM i Security from Syncsort’s Jeff Uehling 300x150 IBM i Security – 6 super short webcasts to help protect your iSeries

Bonus! IBM i Security Best Practices

Ok, so some topics are just too big for 15 minutes. In this hour-long webinar, Jeff Uehling shares what he’s learned over the past 30 years regarding IBM i security best practices. See why you need to run at security level 50, how to detect and prevent programs that could compromise system security, and what to consider for mobile deployments. Watch the webcast >

Let’s block ads! (Why?)

Syncsort Blog

help, iSeries, Protect, Security, Short, Super, Webcasts
  • Recent Posts

    • TripleBlind raises $8.2 million for its encrypted data science platform
    • Ba’al comes to CPAC, Ted Cruz jokes about his Cancun trip
    • Optimizing data migration/integration with Power Platform
    • AI Weekly: Biden calls for $37 billion to address chip shortage
    • NOT WHAT THEY MEANT BY “BUILDING ON THE BACKS OF….”
  • Categories

  • Archives

    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • March 2020
    • February 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    • December 2016
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • July 2016
    • June 2016
    • May 2016
    • April 2016
    • March 2016
    • February 2016
    • January 2016
    • December 2015
    • November 2015
    • October 2015
    • September 2015
    • August 2015
    • July 2015
    • June 2015
    • May 2015
    • April 2015
    • March 2015
    • February 2015
    • January 2015
    • December 2014
    • November 2014
© 2021 Business Intelligence Info
Power BI Training | G Com Solutions Limited