No matter how prepared you believe you are, sometimes a nefarious entity finds its way onto your network. How to you make sure the critical data and applications on the IBM i are still secure? In this session, we’ll show you how to set up MFA as part of a layered defense around your IBM i to minimize password vulnerabilities._x000D_ Learning objectives:_x000D_
Learning Objectives: *Why IBM i specific security is critical and how to convince the business it should be part of the security policy_x000D_ *How to set up MFA for IBM I using Rocket MFA_x000D_ *How to integrate MFA into your applications like terminal emulation