IBM® Lotus® Connections 2.5 offers many security configuration options; some are enabled by default, while many can be configured by an administrator. This document describes the various options, how they are delivered by default, and why you might want to change them.
Published by CyberDude
I am a CyberSecurity specialist, solutions architect, blogger, twitterer working for a state of the art and innovative technology company. My main responsibilities are to help enterprises protect their data and systems of engagement from unlawful breaches into their network and endpoints. Okay, that was a bit over the top, so to net this out, just think of a cyber cop protecting your perimeter and securing your entryways into your systems. Much of my spare time is spent trying to get a balanced life. Taking the time away from work and just enjoy life. Keeping my mind and body fit by running Spartan Races. Spending time with family and friends. Eating a balance diet..yada yada yada...and living the dream. View all posts by CyberDude