Close

Securing the monster under the bed with System Profile Monitoring

(9C)

Stream: Virtual Room 9
Time: 12:30 - 13:15


Presentation

An advanced dive into the security connections with System Profile Monitoring, starting with “Monitor all connections” and moving into the granular levels of security that are available with this feature of Db2 for z/OS. Do you know all the ways that System Profile Monitoring can protect your environment?

Attachments

There is currently no attachment for Securing the monster under the bed with System Profile Monitoring

Speakers


  • Keziah Knopp at IBM
  • Keziah Knopp is a Db2 for z/OS Specialist at the IBM Z Washington Systems Center (WSC). Prior to joining the WSC Keziah focused on z/OS Communications Server, writing papers and delivering presentations on IPv6 and IBM z Encryption Readiness Technology (zERT). She has presented at SHARE conferences on communications and Db2 REST topics and is an author of the "Db2 13 for z/OS and More" Redbook. Most recently, she worked on a special project for Db2 subsystem automation, collaborating with developers and writing Python scripts.


    Email: keziah.knopp@ibm.com

    Feedback

    Click here to give some Feedback so we can make it even better next year!