Automatically Determine the True Level of Authority of a User Profile
Cyber criminals attempt to escalate their level of privilege by stealing and using administrative credentials. Because IBM i servers are accessed from user PCs across internal and external networks, credential stealing from these exposed PCs and networks is the preferred mechanism for compromising an IBM i server.
Download this podcast to learn about:
Identifying escalated privilege attacks on the IBM i
Determining the true level of authority of a user profile
Controlling and monitoring administrative level users
Setting email alerts to include critical job and security information