Print Icon
 

EBOOK

Understanding your 
IBM i security needs
   
   

The IBM i was designed for security. Yet, because of its reputation as a fortress, system security is often overlooked, leaving valuable company data vulnerable to breach and exposure.  


In today’s interconnected world, many activities that were previously impossible in the closed AS/400 environment are now easily carried out remotely, such as initiating commands, installing or activating programs, updating or erasing data, and moving or copying files to and from IBM i servers.  From the first moment that an AS/400 connected to a PC, the systems became vulnerable to attack.  


For an overview of the IBM i’s inherent security vulnerabilities, download your copy today.

   
   
LinkedIn
Twitter
Youtube