On-Demand Webinar
Disaster-Proof Your IBM i Data
Learn the essentials to address today’s top backup and recovery concerns on IBM i from leading disaster recovery expert Debbie Saugen.
Blog
The DDoS Deception You Need to Know About
By Robin Tatam on Wed, 03/08/2017
A denial-of-service attack is any attempt to interrupt or inflict downtime upon IT systems, but a basic DoS threat is smaller in scale than its DDoS counterpart. With the former, the influx of traffic may come from a single source, while in a DDoS attack, traffic comes from numerous sources – making it more difficult to deal with.
Blog
How “Smash and Grab” Compromises IBM i
By Robin Tatam on Wed, 03/08/2017
During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Blog
What is the Value of SIEM?
By Robin Tatam on Wed, 03/08/2017
As is often the case in the technology industry, the details surrounding security information and event management can be a little unclear. While vendors may offer solutions of varying complexity, there is still a basic idea behind most SIEM products…
Blog
How DR Compliance Requirements Impact HA Decisions
By Tom Huntington on Wed, 03/01/2017
Disaster recovery requirements are part of the geographic and industry regulations that affect our organizations. Having the right solutions in place can help to avoid penalties and make audits go smoothly. Read on to create a complete compliance toolkit.
Blog
How to Choose a Capacity Planning Tool
By Per Bauer on Tue, 02/28/2017
Looking for a capacity planning tool? Find out how to choose a tool that will be the most accurate.
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Article
How Recoverable Is My IBM i?
By Tom Huntington on Thu, 02/09/2017
See how a two-pronged approach using data backups and a high availability solution could deliver the strongest disaster recovery strategy for your organization.
Guide
Dashboards Don't Work (Unless You Have a Metrics Management Strategy)
Tech has had a tremendous impact on the way today’s businesses seek continued growth and improvement. No matter what business they are in, executives everywhere are investing in technology that improves their business processes, gets them ahead of the competition and widens their margins. Ultimately, the return on that investment is determined by how well technology supports a business’ ability to...
Blog
4 High Availability Fibs the Skeptics Want to Believe
By Tom Huntington on Tue, 12/20/2016
High availability solutions are seen as expensive, time consuming, and tricky. So, even though HA tops IT wish lists, many companies pump the brakes and make excuses to delay implementation. We’re here to clear the air for HA.
On-Demand Webinar
Can You Achieve Business Continuity After a Disaster?
What roadblocks have prevented you from taking on a high availability project? Don’t let budget or resources be your excuse for putting off HA one more day. Learn how you can achieve HA with ease.
Blog
What Should I Look for in a High Availability Solution?
By Matt Bresnan on Tue, 12/06/2016
High availability is a buyer’s world. With so many different solutions on the market, you shouldn’t be shy about shopping around until you find the right fit. Follow these tips for selecting your HA solution.
Article
How Do I Know High Availability Is For Me?
By Tom Huntington on Fri, 11/11/2016
IBM i high availability has been at the top of your wish list for a while. Don’t let budget hold you back any longer. Discover how affordable HA can be.