Skip to main content

Sort by
Podcasts

Carol Woodbury on Security Strategies and Best Practices

Charlie Guarino

October 4, 2021

Charlie Guarino: Hi everybody. This is Charlie Guarino. Welcome to another edition of TechTalk SMB. I am so happy today to sit down and have a nice chat with the former IBM i security architect of IBM i and the current co-founder of DXR Security, a company that helps organizations change their IBM i security one […]

Articles

Protecting Data Within New HA/DR Parameters

Jim Utsler

September 30, 2021

There are two types of organizations in the world: those that have experienced unplanned system downtime and those that will. Of the first group, many have likely tightened up their high availability and disaster recovery (HA/DR) methods and tools as a result of their incidents, moving, for example, to hosted cloud-based HA/DR services. Within the […]

Articles

The Cost of Enterprise Downtime

Laura DiDio

September 30, 2021

Enterprise downtime is now more expensive than ever: Some 44% of firms indicate that hourly downtime costs exceed $1 million to over $5 million, exclusive of any legal fees, fines or penalties. Additionally, 91% organizations said a single hour of downtime that takes mission-critical server hardware and applications offline, averages over $300,000 due to lost […]

Articles

The Importance of Cloud-Based HA/DR Technology

Jennifer Goforth Gregory

September 30, 2021

For many organizations, budgeting discussions for disaster recovery (DR) and high availability (HA) have played out in a similar manner for decades: The IT department asks to spend a set amount for capital expenditures and a set amount for operating expenses. However, the infrastructure needed to back up the data center and networks in case […]

E-Books

TechChannel E-book: Why Knowing Your Organization’s Security Needs Can Help Keep Data Locked Down

TechChannel

June 7, 2021

IBM Power Systems hardware and AIX are innately secure—but even top-notch security requires monitoring, patching and security planning to guard against bad actors and keep data locked down. Complacency is a recipe for disaster when it comes to security. An effective security plan requires a multilayered approach that starts with people, then physical security measures, […]

Articles

Announcing IBM i 7.4 TR4 and 7.3 TR10

TechChannel

April 13, 2021

Today, IBM announced the latest round of technology refreshes (TRs)—IBM i 7.4 TR4 and 7.3 TR10. With these latest updates, IBM has prioritized extending automation across various components of the IBM i OS—including the database, security and high availability. IBM i 7.4 TR4 and 7.3 TR10 deliver the following new features: Db2 for i enhancements, including […]

Articles

Is Your Mainframe an Unguarded Fortress?

Dava Stewart

April 12, 2021

Why too many organizations fail to implement adequate security measures on their mainframe operations and how to effectively guard your IBM Z

Articles

Tokenized Encryption Helps Merchants Tackle Security Challenges

Ira Chandler

May 1, 2018

As threats to data security proliferate, the actions taken by the governing bodies are evolving. The governing authority for credit card data is the Payment Card Industry (PCI) Security Standards Council (SSC), which was built by the card brands: Visa, MC, Discover, American Express and JCB. The PCI provides the best practices security standards for […]

Articles

Will You Be The Next Victim Of Ransomware?

Ben Wuest

September 11, 2017

Ransomware is malicious software that has been covertly installed on a device, such as your laptop or phone, which encrypts your private data and demands a monetary ransom for restoring the data to its original format. If the data is highly sensitive, the ransom may be the threat of public disclosure of the private data. […]