Join us for this exclusive webinar and learn how to strengthen the security and traceability of IBM i infrastructures with high performance IBM i SSO.


  • Date :10/23/2025 11:00 AM - 10/23/2025 11:30 PM
  • Place Événement en ligne

 

Description

IBM i systems are crucial to business operations, however, they were designed with 1990s security paradigms in mind, prioritizing isolated environments without todays modern threats like the Internet or ransomware. 

Today, these systems often lack sufficient security measures to confront todays risks, as they are frequently sidelined by contemporary network security tools like SIEM, leading to potential vulnerabilities that could jeopardize an organization's critical data and operations. 

Enhanced focus on securing these IBM i systems is essential to safeguarding against evolving threats. 

With the above points in mind, join our upcoming webinar to : 

  • Discover how STR-iCT can enhance your IBM i security event detection and analysis capabilities. 
  • Learn how our unique expert system evaluates risk levels and ensures traceability within a user-friendly graphical interface, while also offering seamless data export to external tools like SIEMs and SOCs for comprehensive IBM i security management. 
  • Discover how AD-iCT can strengthen SSO between IBM i and Active Directory : With decades of experience in securing IBM i and implementing SSO on hundreds of IBM i partitions, I.GAYTE.IT has created AD-iCT, the software package that provides the essential functions for using and administering an SSO in production.

Agenda

  • Security and traceability issues facing IBM i infrastructures today
  • STR-iCT demo
  • Examples of IBM i attacks as seen by STR-iCT
  • What STR-iCT allowed us to discover and how to implement IBM i security best practices.
  • AD-iCT SSO demo