Today’s IT threat landscape is constantly changing, with more new unforeseen threats each day. Data breaches, hacks, ransomware, and malware are more prevalent than ever before. System monitoring and prevention of these attacks has become a top concern of company leaders. Until recently, security has not been a concern for IBM i shops. Many IBM…
Modernizing your DR plan and Backups: Virtual Tape Library (VTL)
Once upon a time, tape backup was the only answer for a Disaster Recovery (DR) strategy. In many cases today, we have found this strategy incomplete and not successful. Often times, tapes are stored next to the system, stored in a closet, in the trunk of a car, or other places where they are unprotected…
DSC: Running IBM i Software Applications in the Cloud
Since the late 1970s, Enterprise Resource Planning (ERP) and financial software have comprised the bulk of software applications run on IBM POWER systems — specifically the IBM i (AS/400, i Series, System i) operating system. This should come as no surprise, as IBM was founded on the premise of producing computers and hardware specifically earmarked for business….
Legacy Data – Legacy Code
We’ve had many conversations lately with clients regarding their need to organize, prioritize, or “do something’ with legacy data and sometimes legacy code. The origins of these conversations are varied from moving off a production technology platform, enterprise software migrations, industry regulations, to sometimes corporate bureaucracy demands. The conversations typically center around having large amounts…
Prioritizing Threats and staying ahead of the Cybercriminals
The methods of attack and the strategies of the people that attack our networks and data resources continue to evolve. Those of us responsible for protecting resources need to stay ahead of the threats. And as the threats change, the cybercriminals are using new tools to obscure their existence and evade detection. Ransomware is a…