Menu Close
Data infrastructure optimization software
Data integration and quality software
Data availability and security software
Cloud solutions


Security 101: Limiting Powerful User Profiles

Having too many powerful user profiles leaves the security of your IBM i system and data exposed. Best practice dictates, and your security auditors prefer, that users be given only the authorities required to perform their jobs, and that they be granted additional authority only when needed and only for the time required. View this webinar on-demand to get up to speed on powerful profiles for IBM i and how you can better manage the need for elevated authority.

Topics include:

  • Powerful profiles and special authorities
  • Granting elevated authority to processes rather than users
  • Methods of elevating authority
  • How Syncsort can help