Defending Your IBM i Against Malware

Featuring

  • Precisely

About This Webinar

The ever-escalating threats to your business posed by ransomware and all forms of malware cannot be ignored. Cyber-criminals are employing every technology and tactic available to defeat your security systems and then go completely unnoticed as they systematically penetrate and catalog your systems and data to methodically prepare for a coordinated, carefully orchestrated multipronged attack.  The IBM i can be a rich target of valuable data for these bad actors.

Malware attacks are active, not static.  Traditional automated scanning, alerting and remediation practices are no longer enough.  Instead, the focus needs to be upon securing critical assets and data stores using a multi-layered defensive approach. In practical terms, this means employing every possible security tool and tactic available, in a coordinated, programmatic way

  1. Scott Bekker

    Host Scott Bekker Webinar Moderator ActualTech Media

  2. Bill Hammond

    Featuring Bill Hammond Director of Product Marketing Precisely

  3. Gavriel Meir-Levi

    Featuring Gavriel Meir-Levi Sales Director, Security Products Precisely

What You'll Learn

  1. The risks of relying on an “identify and remediate” approach to malware
  2. A different approach to preventing malware more effectively
  3. How a multi-layered security strategy can protect IBM i from malware threats