Another option is to use the exit point programs to secure ODBC, FTP, RMTCMD and others. Exit programs controls...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
that are allowed to read, update, and delete files that are accessed from the remote systems. There are exit programs for Client Access servers as well as for DDM and TCP/IP connections. We can even write our own exit point programs.
MORE INFORMATION ON THIS TOPIC
The Best Web Links: Tips, tutorials and more.
Search400's targeted search engine: Get relevant information on security.
Ask your systems management questions--or help out your peers by answering them--in our live discussion forums.
Read this Search400 Featured Topic: Secure your iSeries