Need Help? Start a Live Chat.

Identify Escalated Privilege Attacks on IBM i

Automatically Determine the True Level of Authority of a User Profile

Cyber criminals attempt to escalate their level of privilege by stealing and using administrative credentials. Because IBM i servers are accessed from user PCs across internal and external networks, credential stealing from these exposed PCs and networks is the preferred mechanism for compromising an IBM i server. 
Download this podcast to learn about:
  • Identifying escalated privilege attacks on the IBM i

  • Determining the true level of authority of a user profile

  • Controlling and monitoring administrative level users

  • Setting email alerts to include critical job and security information