Has anyone here worked with IBM Concert in an IBM i environment? I'm particularly interested in understanding how it can be leveraged for CVE management and compliance monitoring on IBM i systems.
If you have insights, real-world experience, or best practices to share, I'd appreciate your input.
------------------------------
Rohit Chauhan
Senior Technical Specialist
Norway
------------------------------