Simple Steps to Improving Data Security on IBM i 51
Simple Steps to Improving Data Security on IBM i
Approved 13
During this session we will cover a wide range of security and compliance methods including row permissions and column masks used to control access to data and enforce separation of duties, authority collection used to determine the lowest level of security needed by a user, audit journals used to audit the effectiveness of your security solutions, and IBM i services which can be used to quickly accomplish security tasks, including automating security policies. This session will include many examples that you will be able to take home and use right away.
Date & Time
Wednesday September 18th, 2024 11:00am EDT
End Date & Time
Wednesday September 18th, 2024 12:00pm EDT
Venue
Blue Heron B-C
Speakers
John Westcott
Session Format
Standard 60 Minute Session
Learning Objectives
Db2 for i offers a wide range of built in security capabilities allowing you to better secure your data. Learn how to quickly utilize these capabilities to not only understand how to secure your data, but to better secure your data. And, to ensure compliance via auditing.
Audience
The database engineer looking for security and compliance options
Session Level
Intermediate
Conference NAViGATE Florida

Session Comments

No comments