• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • PowerTech AV Automatically Detects Ransomware Activity

    June 29, 2022 Alex Woodie

    IBM i shops that are concerned about ransomware attacks may be interested in a new release of PowerTech Antivirus from HelpSystems, which can automatically detect ransomware activity on the IBM i system and block it before it can cause damage. There’s also a nifty new “canary file” feature that will hopefully keep IBM i users from falling down the coal mine.

    PowerTech Antivirus, which formerly carried the Stand Guard Anti-Virus label, was originally developed by Bytware to detect and prevent viruses from infecting the IFS on IBM i. The software, which HelpSystems obtained in a 2008 acquisition, uses an IBM i port of McAfee’s Anti-Malware Engine, which is kept up to date on the latest malware circulating in the wild.

    As ransomware attacks proliferated, HelpSystems added new features to prevent ransomware from successfully encrypting data on the IFS. With the launch of Powertech AV version 8.05 earlier this year, HelpSystems bolstered the ransomware functionality with a couple of key capabilities.

    For starters, the software can now detect suspicious file activity on the system and automatically block the user profile associated with the activity. The software gives customers the option to specify the sensitivity of the detection engine on a scale of 1 to 100, where 1 is the least strict and 100 is completely locked down, according to Sandi Moore, principal security consultant with HelpSystems.

    “Someone who is renaming files, deleting files, encrypting files very rapidly — that is obviously going to hit a higher suspicion rate,” Moore said in a video on the new function posted to the HelpSystems website. “If you’re on a very low number, you’re going to have a really high tolerance for that activity.”

    Moore recommends that customers monitor how PowerTech AV’s ransomware detection functionality is working to dial in the sensitivity level, or to create exceptions for users that need to create, modify, delete, and encrypt files as part of their jobs. Admins can also specify the software to ignore certain directories.

    PowerTech AV 8.05 brings another compelling new ransomware function: canary files.

    Just like the canaries that miners used to lower into coal mines to detect hazardous gases, the canary file is designed to surreptitiously detect noxious users messing around on the IBM i where they shouldn’t be.

    Moore explained how it works:

    “With the canary file, if someone renames or deletes or tries to modify the canary file, they will be automatically blocked by the software,” she said. “The idea here is to create a file that looks really enticing to a bad guy . . . because they’re pretty sure that you’re going to pay ransom to get that file back. As soon as they try to do that encryption or that rename or that delete or modification, they will be blocked.”

    For example, the customer may create a canary file that resembles a customer master file, one of the most valuable files that an IBM i shop may have (and which is an obvious target for a cyber criminal). After creating the canary file, the PowerTech AV user can set the trap designed to ensnare hackers snooping around on their system.

    The software doesn’t modify the user profile at all, Moore said, but users are blocked from accessing data. If a legitimate user makes a mistake and gets tripped up by the canary file, the admin can quickly unblock the user with a few keystrokes.

    “We’re very excited to bring this functionality on top of the current ability to scan for and find ransomware that’s on the IBM i,” Moore said. “This gives us a little extra leg up where we’re able to detect activity that’s coming from an external source.”

    For more information on the new features, check out the release notes for PowerTech AV.

    RELATED STORIES

    Ransomware Epidemic Hits Epic Proportions, And IBM i Shops Take Notice

    One IBM i Shop’s Close Call With Ransomware

    Bytware Bought by Help/Systems and Audax

     

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: Bytware, HelpSystems, IBM i, IFS, PowerTech, PowerTech AV

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Infor Puts CM3 Project On Hold IBM Mulls Using DataMigrator as Cloud Warehouse Pipeline

    Leave a Reply Cancel reply

TFH Volume: 32 Issue: 46

This Issue Sponsored By

  • Maxava
  • Racksquared
  • LaserVault
  • OCEAN User Group
  • Raz-Lee Security

Table of Contents

  • IBM Mulls Using DataMigrator as Cloud Warehouse Pipeline
  • PowerTech AV Automatically Detects Ransomware Activity
  • Infor Puts CM3 Project On Hold
  • Four Hundred Monitor, June 29
  • IBM i PTF Guide, Volume 24, Number 26

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • EvolveWare Makes Progress With RPG Code Modernization Using AI
  • Why The IBM i Market Needed Another VTL Option
  • What Price Power?
  • Cloud Revenues Saved By The GenAI Boom
  • IBM i PTF Guide, Volume 27, Number 44
  • Power Systems Grows Nicely In Q3, Looks To Grow For All 2025, Too
  • Beta Of MCP Server Opens Up IBM i For Agentic AI
  • Sundry IBM i And Power Stack Announcements For Your Consideration
  • Please Take The IBM i Marketplace Survey
  • IBM i PTF Guide, Volume 27, Number 43

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle