Implementing the best security techniques and strongest configuration is mandatory these days for safe guarding your data. This presentation discusses the latest DB2 security methods, procedures and techniques for fortifying DB2 systems, databases and applications. This presentation details DB2 z/OS and DB2 LUW security strategies such as the impacts of encryption, database design security techniques and how best implement a multi-layered DB2 security data perimeter.
Speaker: Dave Beulke, IBM Champion and Gold Consultant
Join us at 10 AM Central US time
Comments