Case Study

Four Powerful Ways to Use Exit Points for Securing IBM i Access

Four Powerful Ways to Use Exit Points for Securing IBM i Access

A Short History of IBM i Security In the early years of the AS/400, there was little if any communication to/from the system, so implementing security was relatively simple. The approach was primarily managing user authorities, securing user access through menus and applications, and perhaps implementing rudimentary object-level security - and in many cases, this was sufficient. In the 1990s, with the advent of the Internet and the growing need to provide communication between systems and business partners, IBM opened the system to TCP/IP. Over time, the different ways the system could be accessed grew, and the job of securing the system became increasingly more complex. With systems becoming more open came an increase in breaches, and with high-profile breaches came a host of

Join for free to read