• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Reader Feedback On Mad Dog 21/21: In Hack Signo Vinces

    July 18, 2011 Timothy Prickett Morgan

    The opening statement about IBM‘s site being hacked is semi-interesting but has nothing to do with the iSeries. The only people hosting Web sites on the iSeries are us, the iSeries customers, certainly not IBM.

    The info given is good–never can have enough info about security–but has nothing to do with the hack, or preventing the hack. The IBM i operating system and the PowerPC instruction set eliminate most hack gambits. DB2 usage eliminates another class of gambits based on SQL Server. What’s left is lame Web page programming that allows SQL injection or cross-site scripting, has nothing to do with the OS, and mostly is just passed through to visitors like a parasite.

    All in all, this article could have been used to tout the superior security and performance of the iSeries over especially Windows and also Linux on Intel, which are where systems are broke into and data stolen, money stolen, personal info stolen, government info stolen, where every failure of security on the internet takes place.

    But not on the System i. Secure serving on the System i. That should be the message.

    –Ralph

    RELATED STORY

    In Hack Signo Vinces



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Focal Point Solutions Group

    Comprehensive Data Protection from Focal Point SG

    Your organization needs to be thinking differently about your backup & disaster recovery strategy

    Concerns of the Industry

    • Inefficient manual backup processes
    • Effectively storing data offsite
    • Developing and testing a concrete disaster recovery plan
    • Efficient access to data in a disaster scenario for necessary users
    • Risk of cyber security attack
    • Declining IT staff and resources

    The true cause of the above concerns is an organization’s status quo – 80% of IBM i users currently backup to tape and 40% of companies have no DR plan at all. Don’t wait for a disaster to take action.

    The new way to ensure cost-effective safety

    • Automated cloud backup
    • Two (2) remote sites – redundant storage, power, internet pipe, firewalls, etc.
    • Data encryption at all times – in-flight and at-rest
    • Fully managed remote hardware DR, including remote VPN access for necessary users
    • Regularly simulated phishing tests and cyber security training

    Potential “landmines” in solutions to avoid

    • Single point of storage – no redundancy
    • Misleading data analysis, compression/de-dup ratios, sizing of necessary computer resources for backup and DR
    • Large-scale cloud storage with difficult recovery
    • Inability to meet RTO/RPO

    Don’t get caught like the many organizations we’ve seen with inefficient exposed backup data and no DR plan!

    What VAULT400 has to offer

    Backup

    • Native software agent schedules backups to the Focal Point SG cloud based on your retention scheme
    • Client data is backed up to two data centers in US or two data centers in Canada
    • 256-bit AES encryption in-flight and at rest – only the client has the encryption key
    • Detailed data analysis to ensure proper sizing

    Disaster Recovery as a Service (DRaaS)

    • Focal Point SG provides “hands-off” DR – fully managed recovery
    • 60 days of remote VPN access available to unlimited users in event of a disaster
    • Documented reports to ensure defined SLAs are met

    Managed Service Cyber Security Training

    • Fully managed phishing tests
    • Detailed reporting of results
    • Fully managed administration of custom online cyber security training

    VAULT400 Cloud Backup & DRaaS is an IBM Server Proven Solution.

    VAULT400.com/proposal for FREE analysis & proposal

    813.513.7402 | ContactUs@FocalPointSg.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    How Do I Email a PC5250 Screen Shot? INSERT to Overlay Positions in a Character String

    Leave a Reply Cancel reply

Volume 20, Number 25 -- July 18, 2011
THIS ISSUE SPONSORED BY:

looksoftware
PowerTech
inFORM Decisions
Computer Keyes
Twin Data Corporation

Table of Contents

  • Still Wanted: A Power-i System of Systems
  • Post-Recession IT Jobs and Spending Lackluster, Surveys Say
  • Hosted Services And Great Expectations
  • Mad Dog 21/21: Smart Fellers
  • Hands-On, Virtual Training for i Coders and Admins
  • Reader Feedback On Mad Dog 21/21: In Hack Signo Vinces
  • Sundry Summer Power Systems Announcements
  • CEOs and CFOs Pull Rank On CIOs In IT Purchasing Decisions
  • Microsoft Spends Big Big Bucks On Partner Channel
  • SAP Wants Oracle’s TomorrowNow Award Cut Way Down

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM i Has a Future ‘If Kept Up To Date,’ IDC Says
  • When You Need Us, We Are Ready To Do Grunt Work
  • Generative AI: Coming to an ERP Near You
  • Four Hundred Monitor, March 22
  • IBM i PTF Guide, Volume 25, Number 12
  • Unattended IBM i Operations Continue Upward Climb
  • VS Code Is The Full Stack IDE For IBM i
  • Domino Runs on IBM i 7.5, But HCL Still Working on Power10
  • Four Hundred Monitor, March 6
  • IBM i PTF Guide, Volume 25, Number 11

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2023 IT Jungle