Blog
The Evolution of Cybersecurity Solutions for Organizations
Tue, 08/11/2020
In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
Blog
How to remove the data security risk from file transfers
Thu, 07/30/2020
Organizations that allow the use of free or unsecured file transfer services not only leave themselves vulnerable to data loss, ransomware and a whole range of other cyber threats, but they have no control or visibility of what information is being transferred and who receives it.
Blog
Why You Should Integrate Your DLP with MFT
By Brian Pick on Thu, 06/18/2020
Discover how integrating data loss prevention (DLP), threat protection, and managed file transfer (MFT) solutions can bolster the security of your sensitive data.
Blog
IBM i Disaster Recovery Planning During a Crisis
By Richard Dolewski on Thu, 05/07/2020
As company’s look to cut IT costs during a crisis, don’t scrimp on your disaster recovery investment! Stick to your DR Plan and avoid the temptation to make shortcuts like these.
Blog
What Not to Do for IBM i Disaster Recovery
By Debbie Saugen on Tue, 04/21/2020
It may seem like common sense, but you’d be surprised how many organizations are still making these tape media mistakes. If this is you, there’s never been a better time to change your processes and improve IBM i disaster recovery!
Blog
7 Misconceptions About Automation
By Chuck Losinski on Tue, 03/31/2020
Don’t let fear of the unknown decide your fate. Familiarize yourself with the facts about automation before you spend another minute on manual AS400 operations.
Blog
Five Tips for the Automation Journey
By Tom Huntington on Tue, 03/31/2020
Here are five tips from Tom Huntington on how best to move your IBM i automation project along the path to success.
Blog
Common Excuses for Not Automating
By Tom Huntington on Tue, 03/31/2020
Whether it’s staffing, budget, or complexity, we’ve heard all the excuses to forgo automation. The next time you hear—or find yourself making—an excuse, have the response ready.
Blog
The Case for Storage Area Networks (SAN)
By Tom Huntington on Tue, 03/03/2020
Using storage area networks or SAN for virtualization and dynamic allocation of system resources can lower the total cost of ownership of disk and improve flexibility for backups and more. Here’s how.
Blog
5 Scary Stories about iSeries Disaster Recovery
By Debbie Saugen on Tue, 10/31/2017
If you have no disaster recovery plan, have never tested a recovery, or are thinking it could never happen to your organization, you could be in for some scary consequences.
Blog
Database Transaction Log Management
Mon, 03/06/2017
Don't let database transaction logs weigh you down. Find out how to preserve data integrity and consume less disk space.
Blog
How DR Compliance Requirements Impact HA Decisions
By Tom Huntington on Wed, 03/01/2017
Disaster recovery requirements are part of the geographic and industry regulations that affect our organizations. Having the right solutions in place can help to avoid penalties and make audits go smoothly. Read on to create a complete compliance toolkit.
Blog
Modern RMM Tools for MSPs
Wed, 08/24/2016
Where managed services providers once delivered self-service and after-hours support for beleaguered IT teams, most have now evolved to offer remote monitoring and hosting. But has their technology been keeping pace?
Blog
What’s Really Faster: VTL or LTO?
By Tom Huntington on Tue, 08/16/2016
VTL can be faster than LTO if you take advantage of the virtual features, but if your backup rules stay the same, you may be disappointed. Read on.
Blog
“Confessions” of a CIO: How to Tackle the Toughest Business Challenges
Tue, 08/16/2016
A new book on CIOs should put ‘the cat among the pigeons’ and create some interesting debate amongst IT professionals, particularly about risk taking and tough management decisions.