The IBM i system, along with all of its preceding iterations and names, is known for solid architecture with built-in security. There was a time that we could rest assured that the IBM i was not vulnerable to all the viruses and hacks that plagued other platforms. That, however, is no longer true!
Now, the IBM i can be accessed through the back door which bypasses the menu-driven security and the access may not even be noticed. The greatest security threats aren’t from the sources you may think and the costs are greater than you expect.
If you have remote access enabled to your server through ODBC, FTP, or TELNET, the security of sensitive information on your system may be at risk.
IBM i professionals need to understand the often overlooked and usually underestimated security vulnerabilities of IBM i.
Contact us today to gain industry expertise customized to fit your needs. We at Trinity Guard will help you uncover security vulnerabilities in your environment with a practical, hands-on approach that will equip you with the tools you need to get the job done.