Join IBM i CTO & Chief Architect/IBM Distinguished Engineer Steve Will and IBM Power Champion Tom Huntington on July 18th to hear their unique perspective on the direction of this platform.
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
Many IT professionals still use the term AS/400. But can a platform that was introduced in 1988 still be relevant today? The answers typically surprise people.
In this video series, Steve Will provides unparalleled insight into how IBM i generates high customer satisfaction and ROI year after year. He also forecasts what the future holds for IBM i and what makes the platform such a great fit for customers looking for a modernized approach to IT – including its cloud compatibility, the ease it brings to modernizing applications, and much more.
The...
Fortra’s Alert Logic Managed Detection and Response and Digital Guardian Data Loss Prevention have been recognized in Expert Insights’ “Top Solution” awards for Q4 2023.
If you've inherited an IBM i and are unfamiliar with the platform, watch this recorded session where our experts share proven strategies for your successful education in IBM i systems management.
Fully managed service provides customers with comprehensive threat protection, reducing application downtime, and allowing internal resources to focus on product development
Increased collaboration exposes you to more than you may realize. Discover why and how supply chain compromise is so common, before preparing a response.
Safeguarding our credit and debit cards is something we all need to prioritize. In his latest Forbes Advisor article, John Wilson provides tips to keep your payment card details safe from fraud.
Organizations face a growing danger from phishing and ransomware, which have been the most common forms of cybercrime in recent years. Most businesses have fallen victim to phishing or ransomware attacks at some point. Every business needs to act against the growing threat of phishing, the primary method through which ransomware and other malware are spread. On the bright side, organizations have...
Stay ahead of the IBM i curve and watch this webinar to understand the recent IBM market trends and technology launches and how they affect your IBM i.
As it continues to be a primary corresponding channel for most organizations, email remains a central target for cyberattacks. In this webinar we breakdown what is needed for strong email security and the best practices for maintaining it.
If you have a Power Systems hardware upgrade in your future, watch this webinar for expert tips on how to size, secure, and manage your new investment.
In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux.
As you consider taking your IBM i to the cloud, cybersecurity will no doubt top your list of concerns. And for good reason. It’s important to remember that the cloud is kind of a lie. Your sensitive data is simply being sent to someone else’s server, and that server has a physical location somewhere.
Just like on-prem cybersecurity, IBM i cloud security can be divided into two parts:
...