10 Tips for Securing Your AIX Servers

Thu, Mar 16, 2017 12:01 PM CDT{LOCAL_TZ}

10 Tips for Securing Your AIX Servers

Content by HelpSystems

Thu, Mar 16, 2017 12:01 PM CDT

Servers running AIX and other operating systems are frequent targets of cyberattacks, 
according to the Data Breach Investigations Report. From DoS attacks to malware, 
attackers have a variety of strategies at their disposal. So, what’s your first line of defense?

A well-defined security policy.

A written statement of how your organization plans to protect its IT assets is a requirement 
for compliance mandates like Sarbanes-Oxley (SOX), and it’s the most effective way to 
address security issues created by new technologies like mobile devices and social media. 
Having a security policy in place makes it easier to ensure you have appropriate controls in 
place to protect mission-critical data.

But how do you even begin defining an AIX security policy if you’re not an expert on AIX security?

Join this one-hour session where cybersecurity expert Robin Tatam will explain the 10 most 
important issues to consider for setting a strong AIX security policy, including:
  • Securing your front door
  • Setting a strong password policy
  • What you need to monitor on your system

Featured Speaker:

Robin Tatam
Director of Security Technologies

Back to Event Center
close log in form button
Log In Now Not Registered?

close register form button
Register Now to View Recorded Webinar Past Webinar Registrant? Log In Here.

  • z/OS
  • z/VM (Linux on z Systems)
  • z/VM (Not hosting Linux on z)
  • Other z Systems OS
  • IBM i
  • AIX
  • Linux on Power
  • Agree