User Profiles And How To Properly Deploy Them

Robin Tatam, PowerTech

January 18, 2011 FASUG Meeting

A Primer on IBM i User Profiles and How To Deploy Them Properly

Few areas affect the security of your IBM i server as much as your user profiles. Knowing how to configure and maintain user profiles correctly is critical to preventing unauthorized access to your data.

Attend this important session to learn about the security aspects of user profiles, including:

Our Speaker is Robin Tatam, PowerTech.

Robin is Director of Security Technologies for PowerTech, a leading provider of security solutions for the System i. His responsibilities include setting strategic direction, maintaining customer relationships, and leading the team that conducts professional services and free compliance assessments. His goal is to ensure that PowerTech security solutions continue to help companies comply with industry regulations and government legislation around the world.

As an IBM-certified technical consultant, Robin is very familiar with the midrange community. He conducts technical presentations online, in the classroom, and at user group sessions, including COMMON. He has written articles for leading trade journals, and is the host of a weekly Internet Webinar series sponsored by PowerTech. In 2008, he was the co-author of the IBM Redbook, “IBM System i Security: Protecting i5/OS Data with Encryption”

Robin can be reached by email at

Register OnLine to Attend this Meeting

Web Site by: Ashway Consulting, LLC