An Objective Approach to Security
i5/OS may be famous for security, but it doesn't go far enough in protecting your system's data; it doesn't differentiate how the data being accessed can be used. Therefore, it's wise to supplement your security with third-party solutions that can secure how data can be used with network applications.
One popular way of enhancing IBM's built-in security is to analyze requests-or "transactions"-by parsing SQL statements using a network security application. But there is a better way. It's called Object-based security. Find out why it's more effective and more efficient than a Transaction-based approach in this brief white paper that covers the realities of Transaction security and how to overcome them.