Robot HA is a software-based high availability solution that allows you to replicate your important data and keep business running even when your production environment goes down.
If you have no disaster recovery plan, have never tested a recovery, or are thinking it could never happen to your organization, you could be in for some scary consequences.
In today's world of advanced malware, zero-day attacks, and stealthy threats, simply having visibility into the malware affecting your organization is not enough. If you want to protect your business from the costs, risks, and brand damage these threats can cause, you need to consider a more comprehensive approach to complete malware defense.
Are you doing everything you can to protect your organization’s data? Our expert panel discusses high availability considerations for today’s security concerns and more in this recorded webinar.
A user’s ability to execute commands in a green-screen environment is controlled by the limit capabilities (LMTCPB) parameter on their profile. Although without exit programs to extend IBM i security functions, even limited capability users could invoke commands through network interfaces such as FTP.
Does this sound familiar? You recently experienced an “unplanned outage” after an administrator inadvertently issued a PWRDWNSYS command while mentoring a new operator.
Not so long ago, viruses were just one of those little annoyances that come along with using a computer, akin to the gnat that orbits your head at the family picnic.
Do you all remember Malcom Haines’ presentation comparing the viruses on Windows and on IBM i? The first slide, for Microsoft, was an entire page filled, at a 4-point font, with different viruses. Then Malcom switched to the IBM i slide, which was blank. This would always result in an outburst in laughter among us IBM i evangelists.
The Integrated File System (IFS) is one of the most ignored parts of the system, yet it makes possible many of the most powerful and most used features on IBM i servers today.
Disaster recovery requirements are part of the geographic and industry regulations that affect our organizations. Having the right solutions in place can help to avoid penalties and make audits go smoothly. Read on to create a complete compliance toolkit.
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.
See how a two-pronged approach using data backups and a high availability solution could deliver the strongest disaster recovery strategy for your organization.
When Malware Attacks Your IBM i, AIX, and Linux Servers Guide
Malware and ransomware attacks have increased, halting day-to-day operations and bringing organizations to their knees. Businesses know anti malware is essential to protecting PCs from malicious programs, but many don’t realize the value of server-level protection until the damage is done.
This guide examines the real-world...
High availability solutions are seen as expensive, time consuming, and tricky. So, even though HA tops IT wish lists, many companies pump the brakes and make excuses to delay implementation. We’re here to clear the air for HA.
What roadblocks have prevented you from taking on a high availability project? Don’t let budget or resources be your excuse for putting off HA one more day. Learn how you can achieve HA with ease.