10 Tips for Securing Your AIX Servers

Thu, Mar 16, 2017 12:01 PM CDT

10 Tips for Securing Your AIX Servers

Content by HelpSystems

Thu, Mar 16, 2017 12:01 PM CDT

Servers running AIX and other operating systems are frequent targets of cyberattacks, 
according to the Data Breach Investigations Report. From DoS attacks to malware, 
attackers have a variety of strategies at their disposal. So, what’s your first line of defense?

A well-defined security policy.

A written statement of how your organization plans to protect its IT assets is a requirement 
for compliance mandates like Sarbanes-Oxley (SOX), and it’s the most effective way to 
address security issues created by new technologies like mobile devices and social media. 
Having a security policy in place makes it easier to ensure you have appropriate controls in 
place to protect mission-critical data.

But how do you even begin defining an AIX security policy if you’re not an expert on AIX security?

Join this one-hour session where cybersecurity expert Robin Tatam will explain the 10 most 
important issues to consider for setting a strong AIX security policy, including:
  • Securing your front door
  • Setting a strong password policy
  • What you need to monitor on your system

Featured Speaker:

Robin Tatam
Director of Security Technologies

Back to Event Center
close log in form button
Log In Now Not Registered?

close register form button
  • z/OS
  • z/VM (Linux on z Systems)
  • z/VM (Not hosting Linux on z)
  • Other z Systems OS
  • IBM i
  • AIX
  • Linux on Power
  • Agree