Prevent IBM i Data Breaches: Protect Your Network from the Inside
Sponsored by: PowerTech
August 2, 2015
Tuesday, September 29 2015 at 2:00pm ET
The most recent wave of data breaches at government agencies and private organizations demonstrates that enterprise network security is still not providing adequate protection. But sophisticated security software abounds for nearly every computer operating system, including IBM i. The problem is that many network administrators aren’t aware of the latest trends in network protection.
Many enterprise IT managers believe a so-called “threat management gateway”—otherwise known as a next-generation firewall—is all you need for complete IBM i security. However, just because the network border is secure doesn’t mean your computer platforms are truly locked down against data breaches.
In this webcast, network security expert Mel Beckman teams with IBM i security expert Robin Tatam of HelpSystems to explain three critical host-oriented protection technologies aimed at guarding your network from the inside, not just at the gate. Intrusion detection, security event monitoring, and file integrity monitoring are all essential weapons in a modern network protection arsenal. Once you learn their value, you’ll want them guarding your servers from data breach.
Register Now!
If you have already registered, click here to access
Speakers
Mel Beckman has been writing computer-related features and product reviews for more than 20 years, with a focus on IT, data centers, networking, and communications. Mel has presented hundreds of seminars on computing technology throughout the United States, Europe, and Asia.
Robin Tatam is a CISM with two decades of AS/400 and IBM i consulting experience. He has a strong midrange background that includes programming in RPG and advanced CL, web enablement using CGI and IBM refacing products, as well as systems administration.
An IBM-certified technical consultant, Robin conducts technical presentations online and at user group meetings, including COMMON, where he is a subject matter expert. He has written numerous articles for leading trade journals and was the co-author of the IBM Redbook, "IBM System i Security: Protecting i5/OS Data with Encryption."
About the Author
You May Also Like