Product Video
Watch a Demo of Powertech Antivirus
Powertech Antivirus provides native virus scanning on your server environment and helps ward off threats. Security teams can take advantage of one of the most comprehensive sets of virus signatures.
In this demo, you'll see how Powertech Antivirus can help take control and eliminate potential threats by providing:
Native scanning for IBM i, AIX, Linux x86, Linux on IBM Z, LinuxONE, and...
Press Release
Almost Two-Thirds of Financial Services Firms Have Suffered a Cyber-attack in the Last 12 Months
65% of large Financial Services (FS) firms have suffered a cyber-attack in the last 12 months, according to new research today from data security provider.
Blog
Endpoint Antivirus Software: What It Is, and Why You Need It
By Bob Erdman on Mon, 10/19/2020
The threat landscape can be a frightening scene when you look at the malicious attacks and ransomware infiltrating organizations around the globe. The good news: Endpoint antivirus applications are making enormous strides in their ability to protect enterprise-level equipment and data from attack. The bad news: Many companies overlook the need to secure non-Windows infrastructure and focus their...
Blog
How to Get Buy-In for Your IT Cost Optimization Strategy
By Per Bauer on Fri, 08/28/2020
Policy alone is rarely enough to influence change. Lasting impact requires buy-in from the organization and is best achieved using a mix of different influence levers.
Blog
The Evolution of Cybersecurity Solutions for Organizations
Tue, 08/11/2020
In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
On-Demand Webinar
How to Do IT Cost Optimization
By Per Bauer
30% of hybrid IT spend is wasted. Whether you find that number shocking or not, you likely don’t know how to identify and eliminate the wasted spend while assuring performance.
Many organizations have adopted a “performance at any cost” mindset to ensure service delivery and choose to overprovision IT resources for peace of mind. But the cost of overprovisioning adds up and quickly becomes...
Quote
Request Pricing for VCM
VCM offers performance assurance and optimization for your entire hybrid IT. You could reclaim 30% of your hybrid IT spend that is currently wasted. To get pricing, fill out the form to the right.
Once your request is received, we'll get in touch to learn about your IT environment (number of OSIs, etc). Then we'll calculate your personalized quote based on your organization's specific needs.
...
Guide
How to Do IT Cost Optimization
Our years of experience shows that organizations waste 30% of their hybrid IT spend, on average. This article identifies the five key components of a cost optimization strategy and how to be successful with each of them.
On-Demand Webinar
IFS Security: How to Close the Most Commonly Overlooked Security Gap
By Sandi Moore
Because the IFS is so integral to IBM i, failing to secure it could spell disaster for your organization. And there’s one IFS security gap that even experienced IBM i pros often overlook!
Blog
Why You Should Integrate Your DLP with MFT
By Brian Pick on Thu, 06/18/2020
Discover how integrating data loss prevention (DLP), threat protection, and managed file transfer (MFT) solutions can bolster the security of your sensitive data.
On-Demand Webinar
Remote Management for IBM i Backups
Watch this recorded webinar to learn the tools and techniques you need to set up remote management for unattended IBM i (iSeries, AS/400) backups.
Article
Robot Save Restricted State Utility (RSU)—Get Your Weekends Back!
By Chuck Losinski on Tue, 06/02/2020
There are processes that are required on your IBM i that need to run with the system in what is called a “restricted state” condition. A restricted state is when all subsystems are inactive and new jobs cannot enter the system. Only the system console might be active.
Blog
IBM i Disaster Recovery Planning During a Crisis
By Richard Dolewski on Thu, 05/07/2020
As company’s look to cut IT costs during a crisis, don’t scrimp on your disaster recovery investment! Stick to your DR Plan and avoid the temptation to make shortcuts like these.
VCM
Get actionable insights to optimize hybrid IT spend and assure performance
On-Demand Webinar
Lights-Out Automation for IBM i Data Centers
In a time when unattended computer operations are expected, IBM i is the right platform. Watch this webinar to get the success formula for lights-out automation.
Blog
What Not to Do for IBM i Disaster Recovery
By Debbie Saugen on Tue, 04/21/2020
It may seem like common sense, but you’d be surprised how many organizations are still making these tape media mistakes. If this is you, there’s never been a better time to change your processes and improve IBM i disaster recovery!
Press Release
The Average “Cyber Breach” Costs Business £5,220 Says this Gov’t Report: Is It Badly Wrong?
A recent government-commissioned report claims that the average cost of a cyber-breach for medium to large UK businesses and charities is a mere £5,220 – despite other industry surveys estimating this number to be closer to £4 million. But industry experts like Alyn Hockey, VP of Product Management at Clearswift, warn that the figure appears to be misleadingly low.