Db2 for z/OS Security Best Practices
Project and Program:
Information Management,
Database
Tags:
Proceedings ,
2018 ,
SHARE St. Louis 2018
Db2 for z/OS security has evolved over the years significantly to help address security challenges, meet regulatory requirements and satisfy auditors with minimum impact to applications. This session will discuss the best practices to protect remote access and data access in Db2 for z/OS by exploiting the various new capabilities in this area.-Gayathiri Chandran-IBM
Back to Proceedings File Library