Robot HA is a software-based high availability solution that allows you to replicate your important data and keep business running even when your production environment goes down.
Watch this webinar to learn simple ways multi-factor authentication can protect your IBM i. You'll also get a sneak preview of Powertech Multi-Factor Authentication, our new multi-factor authentication solution.
If you have no disaster recovery plan, have never tested a recovery, or are thinking it could never happen to your organization, you could be in for some scary consequences.
IBM PowerHA can simplify HA/DR management—including role swaps and day-to-day monitoring—and pairs well with software-based replication tools on IBM i. Watch to learn more.
In this quick video, security expert Robin Tatam explains how automating your security policy management is an easy way to keep tabs on your security configuration.
Ad hoc queries and reports are the bane of many IT departments. The need to churn out frequent, one-off, "must have" data queries for users can be a significant drain on developers' time. Users can't be blamed for the numerous impromptu requests. Customer service, continuous improvement, and the maintenance of competitive advantage demand that business people regularly look at data in innovative...
Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
In today's world of advanced malware, zero-day attacks, and stealthy threats, simply having visibility into the malware affecting your organization is not enough. If you want to protect your business from the costs, risks, and brand damage these threats can cause, you need to consider a more comprehensive approach to complete malware defense.
Robin Tatam has fielded quite a few questions about how to encrypt IBM i data. In this quick video, he outlines your options and explains field procedures (FieldProcs).
It’s time to reconsider traditional approaches to cybersecurity.
Handling IT security in-house is the norm at most organizations.
But no matter what industry you operate in, there’s one fact you can’t ignore: cybersecurity is more complex than ever.
With technology and threats changing rapidly, does it still make sense to rely solely on internal resources? Many organizations are beginning to...
Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier.
One of the most serious mistakes is failing to create a well-defined security policy.
A written statement of how your...
Are you doing everything you can to protect your organization’s data? Our expert panel discusses high availability considerations for today’s security concerns and more in this recorded webinar.