Manage Learn to apply best practices and optimize your operations.

Alternative to "application only" security

Learn about exit point programs as an alternative to "application only" security.

Another option is to use the exit point programs to secure ODBC, FTP, RMTCMD and others. Exit programs controls...

that are allowed to read, update, and delete files that are accessed from the remote systems. There are exit programs for Client Access servers as well as for DDM and TCP/IP connections. We can even write our own exit point programs.


The Best Web Links: Tips, tutorials and more.

Search400's targeted search engine: Get relevant information on security.

Ask your systems management questions--or help out your peers by answering them--in our live discussion forums.

Read this Search400 Featured Topic: Secure your iSeries

This was last published in July 2002

Dig Deeper on iSeries system and application security

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.