• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • NSPI Taps Halcyon to Manage i Hosting Customers

    April 27, 2009 Timothy Prickett Morgan

    Network Services Plus, a long-time peddler of AS/400 and successor products and services, has tapped Halcyon Software to provide system monitoring and automation capabilities to customers who use NSPI’s i-related hosting services.

    NSPI, which is located in the Roswell suburb of Atlanta, Georgia, has been around the IBM midrange for the past 22 years and, among other things, does consulting for JD Edwards suites as well as application hosting and business continuity services. Three weeks ago, NSPI announced a partnership with high availability software maker Maximum Availability, which will see NSPI sell, implement, and support Maximum Availability’s *noMax software in the United States as well as offering *noMax to the customers who use NSPI to host their own i-based applications.

    Under the agreement between NSPI and Halcyon Software, NSPI will offer Halcyon’s System Operations Suite and Operations Center to provide message management, reporting management, and job scheduling for its i hosting customers and to use the tool itself to manage the machines it runs on behalf of customers.

    “Halcyon is delighted to be working with NSPI to deliver our advanced systems management portfolio to its managed services customers,” said John Dominic, channel manager for Halcyon Software, in a statement. “After years of working with large managed services companies, we have a good understanding of the outsourcing business.”

    “System and data availability are absolute musts for NSPI customers,” explains Tim Roe, sales and marketing director at NSPI. “Providing a 24×7 monitoring solution is critical for small and medium sized businesses that might not have a hardened, secure, secondary facility and/or the staffing to support. By working with Halcyon Software, we are excited to be able to offer advanced monitoring and automation to customers at a reasonable cost.”

    RELATED STORIES

    MaxAva Taps NSPI for Sales and Support in the U.S.

    i OS Jobs Spawn Anew with Halcyon’s Updated Scheduler

    NSPI Launches CBU as a Service Offering

    Halcyon Boosts Spool File Manager, Company

    Halcyon Updates Systems Management Tools

    Halcyon Goes Graphical with Disk Space Manager

    Halcyon Enters U.S. Market for Systems Management Tools



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 18, Number 16 -- April 27, 2009

    Sponsored by
    Raz-Lee Security

    With COVID-19 wreaking havoc, cybercriminals are taking advantage of the global impact that it has had on our families, our businesses and our societies. It is more important now than ever to ensure that IT systems are protected, so that when all of this is behind us, we can get back to business as usual as quickly as possible.

    iSecurity Anti-Ransomware protects organizations against ransomware attacks and other kinds of malware that may access and change business-critical data on your IBM i. It even protects against zero-day attacks. Anti-Viruses can only report on the damage an attack has caused, but not stop it.

    iSecurity Anti-Ransomware has been recently enhanced with a Self-Test feature that allows you to simulate a ransomware attack on your IBM i. The simulated attack is limited to the test folder and cannot harm any other folders or files. This new feature lets organizations see how they are protected against known or unknown ransomware.

    Key Features:

    • Real-time scanning for known and unknown ransomware threats.
    • Blocks and disconnects the intruder.
    • Instantaneously sends alerts to SIEM as well as the offending computer.
    • Self-Test for attack simulation
    • Classification of the attack based on log.
    • Automatic updates with the most current ransomware definitions.

    Contact us at https://www.razlee.com/anti-ransomware

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Trouble-Shooting i5/OS Printer Problems in a Warehouse Environment Twitter from an AS/400? Kisco Lets You Do It

    Leave a Reply Cancel reply

TFH Volume: 18 Issue: 16

This Issue Sponsored By

    Table of Contents

    • IBM Launches Power6+ Servers–Again
    • Power Systems Down A Bit in IBM’s First Quarter
    • COMMON Europe Opens Up Global i Top Concerns Survey
    • Jilted Sun Snapped Up by Oracle for Application Systems
    • JDA Sales Hampered and Profits Slammed by Downturn in Q1
    • NSPI Taps Halcyon to Manage i Hosting Customers

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • POWERUp Brings IBM i Base Back Together in the Big Easy
    • New Nav for i Brings New Stuff to You
    • Why Infor’s IDF Is Important for Customer Innovation
    • Four Hundred Monitor, May 25
    • IBM i PTF Guide, Volume 24, Number 21
    • How Committed Is Big Blue To The IBM Cloud?
    • Immutable Copies Are Only As Good As Your Validation
    • Guru: IBM i *USRPRF Security
    • ERP Transitions Loom for SAP on IBM i Customers
    • Inflation Pumps Up Global IT Spending, Supply Chain Deflates It

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2022 IT Jungle

    loading Cancel
    Post was not sent - check your email addresses!
    Email check failed, please try again
    Sorry, your blog cannot share posts by email.