Articles & Content


DB2 for z/OS Security Best Practices (B17)

Topic: 2009 EU

Subtopic: DB2 for z/OS

DATE: 2009-10-8 (11:00 - 12:00)
SPEAKERS: Roger Miller (IBM Silicon Valley Lab)

Security is in the headlines and growing much more important. This session discusses practices for security and how you can make improvements, depending upon your security objectives. Most sites have a range of needs and objectives. For some, basic security is adequate. For others better or standard security techniques are needed. In other cases, best security practices are demanded. Our tools range from very tight system security to basic techniques, applicable with public information on the web. Application security techniques are more flexible, but require much more work by more people, so they are generally weaker. Choices and guidelines will be our primary points, discussing how to provide improved security for your situation.

EXP. LEVEL: Intermediate


understand the range of choices for security

improvements in recent versions

how to make incremental enhancements

trends and directions

resources for more information

This file is being provided by IDUG. We would encourage you to join IDUG to get full access to all of our files and resources. Joining IDUG is FREE and signing up is simple. Click here to join! or login!

Download File
Click to Download

NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.