Watch recording (logged in Tridex members only)
Session title: Who’s Knocking At the Door? Best Practices for Auditing Access to Db2 for z/OS
Session abstract: Do you want to know when unauthorized access to Db2 has been attempted? Maybe learn who messed up your data?
Continue reading “Who’s Knocking At the Door? Best Practices for Auditing Access to Db2 for z/OS”