Banner

35AC IBM i Available Field, File and Communications Encryption Technologies

= Award Winning Session | = AIX | = IBM i | = Linux

Tuesday, May 8, 2012: 2:00 PM-3:15 PM
Nile (Disneyland Hotel )

Session Abstract:
Social security numbers, credit card numbers, check numbers, PIN codes: you store sensitive data in your DB2 database files, exchange sensitive data with your customers and vendors using Internet eCommerce, and you know you should do more to secure the data to prevent its loss. In this session we will discuss real solutions you can start using immediately to secure your IBM i data and communications with your trading partners. This is not a technical session, but should be helpful to developers in considering options for securing data and communications. Solutions for database field encryption, file encryption, and secure managed file transfer will be discussed.
Learning Objectives:
.
Audience:
.




Home Annual Meeting and Exposition

Share |

Copyright © 2010 COMMON, A Users Group.
All Rights Reserved.