

Presenter: Scott Forstie
Topic: Data Security and IBM i
This session will include an overview of technologies that can be used to answer the tough data security questions and satisfy the important mandates for securing data. The session includes enhancements made at IBM i 7.3 to allow you to identify and safely remove excess authority. Technologies discussed at this session will include: Authority Collection, Consumption of Journal data using SQL, Row Permissions, Column Masks, Guardium for IBM i, Securing columns from Database Engineers, Adopted authority and SQL, and more.
Security should be a topic where clients continuously invest to reduce risk and enable real-time incident discovery. Come to this session to arm yourself with the technical knowledge you need to address this important topic.
|