Skip to main content

IBM software for System z


New DB2 10 for z/OS Beta security features help satisfy your auditors without impacting your production applications

Available in replay for your convenience, register now.

Developed for: IT managers, application architects, database administrators, system administrators, system programmers and system architects

Technical level: Intermediate

Business, regulatory and customer privacy continue to require tighter controls over access to your critical data. If data administrators could establish security policies or security logic on tables with restricted data, they could enforce security controls on all applications and tools that access the restricted data. And, if they could do that without changing existing applications, the savings in resources alone would be considerable.

Join us for this complimentary teleconference and learn how new controls and features in the planned expansion of DB2® 10 for z/OS® Beta data-centric security make this possible. Businesses can comply with new regulations without changes to existing applications since security logic is separated from application logic. As security policies change, they will also be easier to deploy since the security logic can be automatically deployed against all SQL access to the data.

In this session, we’ll discuss how the new features in DB2 10 for z/OS Beta can:

Learn about all the new security and auditing capabilities planned for DB2 10 for z/OS Beta.

Speaker: Jim Pickel, Senior Technical Staff, IBM Software Group

This teleconference will also be available for replay after the event.

Related links