RETIRED CONTENT

Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.

Modernization efforts have increased the attack surfaces as companies web-enable legacy applications, integrate with other platforms, and expand IBM i’s overall network presence.

Organizations need to apply the same attention to detail for IBM i security as they do for other platforms.

Increased network presence (internal and external), applications (internal and web-based), and excessive user access rights are examples of potential security risks that will be covered in this report.

This template is intended to facilitate security risk awareness. It is not a security assessment. Use the information gathered here to guide more detailed assessments and strategies to secure your IBM i system.

Related Content

Hide Details

Search Code: 58525
Published: May 2, 2013
Last Revised: May 2, 2013

Social

Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.