Article
How to End MIMIX Headaches for Good
By Chuck Losinski on Wed, 05/13/2020
Ready to eliminate manual monitoring in Assure MIMIX? This article shows you how to start monitoring MIMIX and stop wasting your time and risking your irreplaceable data.
Blog
IBM i Disaster Recovery Planning During a Crisis
By Richard Dolewski on Thu, 05/07/2020
As company’s look to cut IT costs during a crisis, don’t scrimp on your disaster recovery investment! Stick to your DR Plan and avoid the temptation to make shortcuts like these.
Blog
What Not to Do for IBM i Disaster Recovery
By Debbie Saugen on Tue, 04/21/2020
It may seem like common sense, but you’d be surprised how many organizations are still making these tape media mistakes. If this is you, there’s never been a better time to change your processes and improve IBM i disaster recovery!
Article
Clearswift – staying safe and secure throughout the coronavirus pandemic
Thu, 04/16/2020
The coronavirus (COVID-19) situation is changing rapidly on a day-to-day basis, so we wanted to take this opportunity to address what it means for Clearswift and Fortra as a global organization and an employer, and how it might impact on our customers, prospects and partners.
Press Release
The Average “Cyber Breach” Costs Business £5,220 Says this Gov’t Report: Is It Badly Wrong?
A recent government-commissioned report claims that the average cost of a cyber-breach for medium to large UK businesses and charities is a mere £5,220 – despite other industry surveys estimating this number to be closer to £4 million. But industry experts like Alyn Hockey, VP of Product Management at Clearswift, warn that the figure appears to be misleadingly low.
Press Release
Second Marriott Data Breach Affects 5.2M Guests
Marriott International has had its second data breach in less than two years. Cybersecurity experts Alyn Hockey of Clearswift and Kelly White of RiskRecon offer their reactions, in an article published on www.hotelbusiness.com.
Press Release
Industry Leaders And Cybersecurity Experts Insight On Marriott International Data Breach
Alyn Hockey, VP of Product Management at Clearswift, weighs in on the recent Marriott International data breach.
Blog
7 Misconceptions About Automation
By Chuck Losinski on Tue, 03/31/2020
Don’t let fear of the unknown decide your fate. Familiarize yourself with the facts about automation before you spend another minute on manual AS400 operations.
Article
Why Relying on Scripted Operations Can Be a Problem for Your Business
By Steve Brasen on Tue, 03/31/2020
Scripting provides a powerful platform to automate simple tasks, but overusing custom scripts is hazardous for your business.
Blog
Five Tips for the Automation Journey
By Tom Huntington on Tue, 03/31/2020
Here are five tips from Tom Huntington on how best to move your IBM i automation project along the path to success.
Blog
Common Excuses for Not Automating
By Tom Huntington on Tue, 03/31/2020
Whether it’s staffing, budget, or complexity, we’ve heard all the excuses to forgo automation. The next time you hear—or find yourself making—an excuse, have the response ready.
Blog
The Case for Storage Area Networks (SAN)
By Tom Huntington on Tue, 03/03/2020
Using storage area networks or SAN for virtualization and dynamic allocation of system resources can lower the total cost of ownership of disk and improve flexibility for backups and more. Here’s how.
Article
IBM on IASP for PowerHA Implementations
By Chuck Losinski on Tue, 03/03/2020
You’ve heard about IASP technology many times over the years, but you’ve been ignoring it, haven’t you? Steve Finnes confirms that it’s past time we “get to know it, understand it, and not be afraid of it.”
Article
FlashCopy: Pros and Cons
By Tom Huntington on Wed, 02/26/2020
IBM System Storage FlashCopy might seem like magic. But do the benefits for IBM i business continuity outweigh the hidden costs? Read on to find out.
Blog
Three Lessons Learned from A Data Breach
By Bob Erdman on Mon, 02/24/2020
Simple lessons learned from the many breaches we’ve observed, like careless employees and unusual attack vectors, and ways they can be avoided.
Blog
IBM i Data Replication: Hardware vs. Software
By Tom Huntington on Mon, 02/17/2020
There are a lot of options out there for IBM i data replication. We’ll help you weigh the options as your put together the pieces of your high availability plan.
On-Demand Webinar
Cybersecurity Trends in 2019 and Predictions for 2020
By Bob Erdman
Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.
On-Demand Webinar
JAMS Feature Tour
Wed, 12/04/2019
Join Robert Newman for this condensed feature tour!