{"id":62478,"date":"2023-06-28T14:23:29","date_gmt":"2023-06-28T12:23:29","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/?p=62478"},"modified":"2025-06-06T09:31:28","modified_gmt":"2025-06-06T07:31:28","slug":"guarantee-the-protection-of-ibm-i-data","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/on-demand-webinars\/guarantee-the-protection-of-ibm-i-data\/","title":{"rendered":"[Webinar] Guarantee the Protection of IBM i Data"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-overflow:visible;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top:0px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;--awb-font-size:30px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:30;line-height:1.33;\"><p class=\"_04xlpA direction-ltr align-start para-style-body\"><span class=\"TextRun SCXW144062699 BCX2\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW144062699 BCX2\" data-ccp-parastyle=\"Normal (Web)\">Guarantee <\/span><span class=\"NormalTextRun SCXW144062699 BCX2\" data-ccp-parastyle=\"Normal (Web)\">the<\/span><\/span> <span class=\"TextRun SCXW144062699 BCX2\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW144062699 BCX2\" data-ccp-parastyle=\"Normal (Web)\">Protection<\/span> <span class=\"NormalTextRun SCXW144062699 BCX2\" data-ccp-parastyle=\"Normal (Web)\">of IBM<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW144062699 BCX2\" data-ccp-parastyle=\"Normal (Web)\">i<\/span><span class=\"NormalTextRun SCXW144062699 BCX2\" data-ccp-parastyle=\"Normal (Web)\"> Data<\/span><\/span><\/p><\/h1><\/div><div class=\"fusion-text fusion-text-1\"><p><span data-contrast=\"none\">With growing cybersecurity concerns and PII protection regulations such as GDPR, CCPA, CPRA and a slew of new U.S. state data privacy laws, the management of \u2018test data\u2019 has become a top concern for most organizations. Not least on IBM i, a system well-renowned for its security.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Anonymization of personal data is essential. But how to ensure the data remains \u201creadable\u201d and consistent? And will anonymized data complicate the testing process? <\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><strong>In this webinar, Alan Ashley, ARCAD\u2019s DevSecOps expert will demonstrate how to secure ALL your databases \u2013 both IBM i and non-IBM i &#8211; while maintaining integrity within and between each DBMS.<\/strong><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">If you are still using raw production data in your development cycle, learn how to automate the anonymization process and:\u00a0<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Safeguard Production data as it moves to Development and Test environments<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Anonymize PII while maintaining usability<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Centralize anonymization rules between your different DBMS<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Automatically identify sensitive data<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_3 1_3 fusion-flex-column resource-download-form webinar-registration-form \" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:40px;--awb-margin-top-small:10px;--awb-margin-bottom-small:10px;--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:30;line-height:1.2;\"><p class=\"title-heading-center\">Missed our last webinar?<br \/>\nWatch it on replay!<\/p><\/h2><\/div><div class=\"fusion-text fusion-text-2\"><p><!-- &#091;if lte IE 8&#093;><script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2-legacy.js\"><\/script><!&#091;endif&#093;--><script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2.js\"><\/script><script>\n  hbspt.forms.create({\n\tportalId: \"4514828\",\n\tformId: \"f4df7f69-db43-4dec-a3e1-787ade671376\",\n     css: \"\",\n        blockedDomains: [\"freschelegacy.com\",\"freschesolutions.com\",\"rocketsoftware.com\",\"softlanding.com\",\"mkssoftware.com\",\"midrangedynamics.com\",\"remainsoftware.com\",\"taskforce-it.de\",\"origsoft.com\",\"itheis.com\",\"idinfo-conseil.com\",\"broadcom.com\",\"rs.com\",\"idinfo.eu\",\"looksoftware.com\",\"proximity.co.uk\",\"bigblue.it\",\"xhypm.com\",\"seagullsoftware.com\",\"seagullsoftware.com\",\"xcase.com\",\"comsid.de\",\"genebag.com\",\"mailo.com\",\"neuf.fr\",\"pks.de\",\"armonie.group\",\"pascalpolverini.com\",\"polverinipartners.com\",\"systnaps.com\",\"sarus.tech\",\"microfocus.com\",\"opentext.com\",\"md-na.com\",\"redbourn.co.uk\",\"omninet.be\",\"cdinvest.be\",\"cdinvest.eu\",\"ptc.com\",\"alvinecapital.co.uk\",\"katchou.eu\",\"talend.com\",\"bartech.es\"],\n        translations: {\n           en: {\n             required: \"Please fill the required field.\",\n             missingSelect: \"Please select an option.\",\n             forbiddenEmailDomain: \"Business address required\",\n             manuallyBlockedEmailDomain: \"Business address required\", \n             submitText: \"WATCH NOW\",\n           }\n       }\n});\n<\/script><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-flex-start fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:5px;--awb-margin-top-small:20px;--awb-margin-bottom-small:0px;--awb-font-size:23px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:23;--minFontSize:23;line-height:1.2;\">The Presenter<\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:auto;--awb-margin-top-large:0px;--awb-spacing-right-large:2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2%;--awb-width-medium:auto;--awb-spacing-right-medium:2%;--awb-spacing-left-medium:2%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><p><img decoding=\"async\" class=\"alignnone wp-image-60433 size-thumbnail\" src=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/10\/alan-ashley-new-150x150.jpg\" alt=\"Alan Ashley\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/10\/alan-ashley-new-66x66.jpg 66w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/10\/alan-ashley-new-150x150.jpg 150w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/10\/alan-ashley-new-200x200.jpg 200w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/10\/alan-ashley-new-300x300.jpg 300w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/10\/alan-ashley-new-400x400.jpg 400w, https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2022\/10\/alan-ashley-new.jpg 500w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_5_6 5_6 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:83.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.304%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.304%;--awb-width-medium:83.333333333333%;--awb-spacing-right-medium:2.304%;--awb-spacing-left-medium:2.304%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-bottom-small:0px;--awb-font-size:25px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25;line-height:1.3;\"><p class=\"title-heading-left fusion-responsive-typography-calculated\">Alan Ashley<\/p><\/h3><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-margin-top:5px;--awb-margin-bottom:5px;--awb-margin-top-small:5px;--awb-margin-bottom-small:5px;--awb-font-size:20px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:20;--minFontSize:20;line-height:1.36;\"><p class=\"title-heading-left fusion-responsive-typography-calculated\">Solution Architect, ARCAD Software<\/p><\/h4><\/div><div class=\"fusion-text fusion-text-4\"><p>Alan has been in support and promotion of the IBM i platform for over 30 years and is the Presales Consultant for DevOps on IBM i role with ARCAD Software. Prior to joining ARCAD Software, he spent many years in multiple roles within IBM from supporting customers through HA to DR to Application promotion to migrations of the IBM i to the cloud. In those roles, he saw first hand the pains many have with Application Lifecycle Management, modernization, and data protection. His passion in those areas fits right in with the ARCAD suite of products.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In this webinar, Alan Ashley, ARCAD\u2019s DevSecOps expert will demonstrate how to secure ALL your databases \u2013 both IBM i and non-IBM i &#8211; while maintaining integrity within and between each DBMS. <\/p>\n","protected":false},"author":15,"featured_media":62675,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[226],"tags":[],"class_list":["post-62478","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-on-demand-webinars"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>[Webinar] Guarantee the Protection of IBM i Data<\/title>\n<meta name=\"description\" content=\"Join us\u00a0to see how to secure ALL your databases \u2013 both IBM i and non-IBM i - while maintaining integrity within and between each DBMS.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dot-anonymizer.com\/resources\/webinars-resources\/guarantee-the-protection-of-ibm-i-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[Webinar] Guarantee the Protection of IBM i Data\" \/>\n<meta property=\"og:description\" content=\"Join us\u00a0to see how to secure ALL your databases \u2013 both IBM i and non-IBM i - while maintaining integrity within and between each DBMS.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dot-anonymizer.com\/resources\/webinars-resources\/guarantee-the-protection-of-ibm-i-data\/\" \/>\n<meta property=\"og:site_name\" content=\"ARCAD\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-28T12:23:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-06T07:31:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2023\/06\/webinar-US-DOT-E-sans-bouton.png\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Miki Laurent\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Miki Laurent\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dot-anonymizer.com\\\/resources\\\/webinars-resources\\\/guarantee-the-protection-of-ibm-i-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/on-demand-webinars\\\/guarantee-the-protection-of-ibm-i-data\\\/\"},\"author\":{\"name\":\"Miki Laurent\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/843a4f941b45bea1aa5764831bc623d0\"},\"headline\":\"[Webinar] Guarantee the Protection of IBM i Data\",\"datePublished\":\"2023-06-28T12:23:29+00:00\",\"dateModified\":\"2025-06-06T07:31:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/on-demand-webinars\\\/guarantee-the-protection-of-ibm-i-data\\\/\"},\"wordCount\":2003,\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dot-anonymizer.com\\\/resources\\\/webinars-resources\\\/guarantee-the-protection-of-ibm-i-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/webinar-US-DOT-E-sans-bouton.png\",\"articleSection\":[\"On-demand Webinars\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/news-events\\\/on-demand-webinars\\\/guarantee-the-protection-of-ibm-i-data\\\/\",\"url\":\"https:\\\/\\\/www.dot-anonymizer.com\\\/resources\\\/webinars-resources\\\/guarantee-the-protection-of-ibm-i-data\\\/\",\"name\":\"[Webinar] Guarantee the Protection of IBM i Data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dot-anonymizer.com\\\/resources\\\/webinars-resources\\\/guarantee-the-protection-of-ibm-i-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dot-anonymizer.com\\\/resources\\\/webinars-resources\\\/guarantee-the-protection-of-ibm-i-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/webinar-US-DOT-E-sans-bouton.png\",\"datePublished\":\"2023-06-28T12:23:29+00:00\",\"dateModified\":\"2025-06-06T07:31:28+00:00\",\"description\":\"Join us\u00a0to see how to secure ALL your databases \u2013 both IBM i and non-IBM i - while maintaining integrity within and between each DBMS.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dot-anonymizer.com\\\/resources\\\/webinars-resources\\\/guarantee-the-protection-of-ibm-i-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dot-anonymizer.com\\\/resources\\\/webinars-resources\\\/guarantee-the-protection-of-ibm-i-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.dot-anonymizer.com\\\/resources\\\/webinars-resources\\\/guarantee-the-protection-of-ibm-i-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/webinar-US-DOT-E-sans-bouton.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/webinar-US-DOT-E-sans-bouton.png\",\"width\":940,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dot-anonymizer.com\\\/resources\\\/webinars-resources\\\/guarantee-the-protection-of-ibm-i-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"ARCAD\",\"item\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[Webinar] Guarantee the Protection of IBM i Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#website\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"name\":\"ARCAD\",\"description\":\"Experts DevOps &amp; Modernisation sur IBM i (alias AS\\\/400 ou AS400)\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#organization\",\"name\":\"ARCAD Software\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"contentUrl\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/arcad-group-logo-text-144.png\",\"width\":144,\"height\":200,\"caption\":\"ARCAD Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/Arcad-Software\\\/116086138469235\",\"https:\\\/\\\/x.com\\\/arcad_software\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/arcad-software\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ARCADSoftwareInc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/#\\\/schema\\\/person\\\/843a4f941b45bea1aa5764831bc623d0\",\"name\":\"Miki Laurent\",\"url\":\"https:\\\/\\\/www.arcadsoftware.com\\\/arcad\\\/author\\\/miki-laurent\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"[Webinar] Guarantee the Protection of IBM i Data","description":"Join us\u00a0to see how to secure ALL your databases \u2013 both IBM i and non-IBM i - while maintaining integrity within and between each DBMS.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dot-anonymizer.com\/resources\/webinars-resources\/guarantee-the-protection-of-ibm-i-data\/","og_locale":"en_US","og_type":"article","og_title":"[Webinar] Guarantee the Protection of IBM i Data","og_description":"Join us\u00a0to see how to secure ALL your databases \u2013 both IBM i and non-IBM i - while maintaining integrity within and between each DBMS.","og_url":"https:\/\/www.dot-anonymizer.com\/resources\/webinars-resources\/guarantee-the-protection-of-ibm-i-data\/","og_site_name":"ARCAD","article_publisher":"https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","article_published_time":"2023-06-28T12:23:29+00:00","article_modified_time":"2025-06-06T07:31:28+00:00","og_image":[{"width":940,"height":350,"url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2023\/06\/webinar-US-DOT-E-sans-bouton.png","type":"image\/png"}],"author":"Miki Laurent","twitter_misc":{"Written by":"Miki Laurent","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dot-anonymizer.com\/resources\/webinars-resources\/guarantee-the-protection-of-ibm-i-data\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/on-demand-webinars\/guarantee-the-protection-of-ibm-i-data\/"},"author":{"name":"Miki Laurent","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/843a4f941b45bea1aa5764831bc623d0"},"headline":"[Webinar] Guarantee the Protection of IBM i Data","datePublished":"2023-06-28T12:23:29+00:00","dateModified":"2025-06-06T07:31:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/on-demand-webinars\/guarantee-the-protection-of-ibm-i-data\/"},"wordCount":2003,"publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"image":{"@id":"https:\/\/www.dot-anonymizer.com\/resources\/webinars-resources\/guarantee-the-protection-of-ibm-i-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2023\/06\/webinar-US-DOT-E-sans-bouton.png","articleSection":["On-demand Webinars"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.com\/arcad\/news-events\/on-demand-webinars\/guarantee-the-protection-of-ibm-i-data\/","url":"https:\/\/www.dot-anonymizer.com\/resources\/webinars-resources\/guarantee-the-protection-of-ibm-i-data\/","name":"[Webinar] Guarantee the Protection of IBM i Data","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dot-anonymizer.com\/resources\/webinars-resources\/guarantee-the-protection-of-ibm-i-data\/#primaryimage"},"image":{"@id":"https:\/\/www.dot-anonymizer.com\/resources\/webinars-resources\/guarantee-the-protection-of-ibm-i-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2023\/06\/webinar-US-DOT-E-sans-bouton.png","datePublished":"2023-06-28T12:23:29+00:00","dateModified":"2025-06-06T07:31:28+00:00","description":"Join us\u00a0to see how to secure ALL your databases \u2013 both IBM i and non-IBM i - while maintaining integrity within and between each DBMS.","breadcrumb":{"@id":"https:\/\/www.dot-anonymizer.com\/resources\/webinars-resources\/guarantee-the-protection-of-ibm-i-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dot-anonymizer.com\/resources\/webinars-resources\/guarantee-the-protection-of-ibm-i-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dot-anonymizer.com\/resources\/webinars-resources\/guarantee-the-protection-of-ibm-i-data\/#primaryimage","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2023\/06\/webinar-US-DOT-E-sans-bouton.png","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2023\/06\/webinar-US-DOT-E-sans-bouton.png","width":940,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.dot-anonymizer.com\/resources\/webinars-resources\/guarantee-the-protection-of-ibm-i-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"ARCAD","item":"https:\/\/www.arcadsoftware.com\/arcad\/"},{"@type":"ListItem","position":2,"name":"[Webinar] Guarantee the Protection of IBM i Data"}]},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#website","url":"https:\/\/www.arcadsoftware.com\/arcad\/","name":"ARCAD","description":"Experts DevOps &amp; Modernisation sur IBM i (alias AS\/400 ou AS400)","publisher":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/arcad\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#organization","name":"ARCAD Software","url":"https:\/\/www.arcadsoftware.com\/arcad\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/","url":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","contentUrl":"https:\/\/www.arcadsoftware.com\/arcad\/wp-content\/uploads\/2017\/09\/arcad-group-logo-text-144.png","width":144,"height":200,"caption":"ARCAD Software"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/Arcad-Software\/116086138469235","https:\/\/x.com\/arcad_software","https:\/\/www.linkedin.com\/company\/arcad-software","https:\/\/www.youtube.com\/user\/ARCADSoftwareInc"]},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/arcad\/#\/schema\/person\/843a4f941b45bea1aa5764831bc623d0","name":"Miki Laurent","url":"https:\/\/www.arcadsoftware.com\/arcad\/author\/miki-laurent\/"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts\/62478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/comments?post=62478"}],"version-history":[{"count":4,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts\/62478\/revisions"}],"predecessor-version":[{"id":62676,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/posts\/62478\/revisions\/62676"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/media\/62675"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/media?parent=62478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/categories?post=62478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/arcad\/wp-json\/wp\/v2\/tags?post=62478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}