• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM i Backup Provider Storagepipe Snapped Up By Thrive

    June 7, 2023 Alex Woodie

    Storagepipe, a Toronto, Ontario-based provider of backup and recovery services for IBM i and other platforms, has been acquired by Thrive, a Massachusetts-based outsourcing company that provides a range of cloud-based IT services.

    Storagepipe has been backing up IBM i servers since it was founded back in 2001. Back in 2015, the last time we checked in with them, the company was utilizing an appliance-based approach to backing up IBM i servers, and any other Windows or Linux servers that customers wanted backed up.

    The backup would be pushed to the Storagepipe appliance, which would then replicate the backup off-site …

    Read more
  • Security Still Top Concern, IBM i Marketplace Study Says

    February 1, 2023 Alex Woodie

    Security continues to be the number one concern of IBM i shops surveyed for the annual IBM i Marketplace Study conducted by Fortra. Application modernization surged ahead from last year’s finish to make the race for number one interesting, while HA/DR and IBM i skills rounded out the top four concerns.

    Fortra (formerly HelpSystems) formally released its 2023 IBM i Marketplace Study last week, making it the ninth straight year that the company has released the study. This year’s study, which you can access here, is based on surveys taken last year by about 300 individuals from the IBM …

    Read more
  • HelpSystems Goes on the Security Offensive Again

    October 5, 2022 Alex Woodie

    Just when you thought HelpSytsems had bought enough companies, the Eden Prairie, Minnesota, company cranks up the acquisition machine again and gobbles up a few more vendors. Like with previous acquisitions, its recent targets are in security.

    The most recent buy was completed a month ago, when HelpSystems bought Outflank Security Tooling, which it describes as “an IT security leader with deep expertise in adversary simulation, specialist cyber security trainings, and a unique cloud-based software offering for red teams.”

    Penetration testing has become popular as security vulnerabilities in corporate systems have become more apparent. Adversary simulation, or “red teaming,” …

    Read more
  • Software Supply Chain Attacks Are A Growing Threat

    October 3, 2022 Alex Woodie

    There’s a lot going on in the world right now, so you probably don’t need something more to worry about. But the cat-and-mouse world of cybersecurity never sleeps, and one of the threats keeping the good guys up at night right now is the growing risk of software supply chain attacks. Unfortunately, security through obscurity won’t provide as much protection for the IBM i server this time around.

    Just what is a software supply chain attack? According to the U.S. government’s Cybersecurity and Infrastructure Security Agency (CISA), a software supply chain attack occurs when “a cyber threat actor infiltrates a …

    Read more
  • The Global State of Cybersecurity Is Not Good

    September 14, 2022 Alex Woodie

    “It’s a jungle out there” may be the best way to summarize the state of cybersecurity at the moment, as recent global events coalesce into a melting pot of politically motivated hackers, the criminal underground, foreign scammers, and widespread domestic vulnerabilities.

    Let’s start with everybody’s favorite topic: scams. If you’re longing for the simple days of the Nigerian 419 scams, you’re not alone, as the playing field for scams has evolved considerably in recent years. That’s not to minimize the continued threat of the 419 scam, which sometimes resulted in a physical kidnapping, or worse. But the idea of getting …

    Read more
  • Security, Automation, and Cloud Top Midrange IT Priorities, Study Says

    August 3, 2022 Alex Woodie

    Improving cybersecurity continues to be the number one overall priority for IT teams at midsize companies going into the second half of the year, but automation and cloud migrations are not too far behind, according to a recent study from Kaseya. Legacy concerns also are viewed as a drag on productivity.

    Kaseya last month published its 2022 IT Operations Report, in which it surveyed 1,877 IT professionals from around the world in April to learn about the top priorities and challenges where they work. The company surveyed only employees at organizations with fewer than 3,000 employees, which is Kaseya’s cut-off …

    Read more
  • IBM i Integration Elevates Operational Query and Analytics

    May 16, 2022 Bill Langston

    Modernization, SQL, RPG, open source, cybersecurity, resilience, compliance, clouds, and AI are the trending topics in enterprise technology. As a result, IT professionals can easily overlook and undervalue software that enables real-time, operational query and analytics.

    In contrast, managers and mid-level staff in accounting, logistics, inventory, sales, customer service, and other departments still place a high value on data access and often wish their IT team could do more to help. Collaboration is the key, because your company isn’t realizing the potential of operational query and analytics if you have narrowly defined it as a dashboard and ad hoc file …

    Read more
  • Guru: IBM i Unauthenticated Access

    April 25, 2022 Bruce Bading

    One of the greatest threats to any network, host, or server is unauthenticated access where an attacker can gain local or remote access with no credentials that can lead to a Critical rating with the following descriptions (CVSS v3.1 User Guide (first.org).

    Confidentiality Impact Complete (There is total information disclosure, resulting in all system files being revealed.)

    Integrity Impact Complete (There is a total compromise of system integrity, and a complete loss of system protection resulting in the entire system being compromised.)

    Availability Impact Complete (There is a total shutdown of the affected resource. The attacker can render …

    Read more
  • Guru: SIEM Is Only Part Of IBM i Cybersecurity

    March 28, 2022 Bruce Bading

    Many times, we hear from IBM i business owners that their SIEM – that’s short for Security Information and Event Management – is their cybersecurity solution for the IBM i. But that can’t be true, and I want to explain why it is part of the security shield but certainly not all of it.

    Let’s start with SIEMs and how they fit into cybersecurity frameworks. SIEM is mentioned in the PCI appendix, but not once in the core of the 250+ PCI DSS requirements, likewise, the NIST Cybersecurity Framework lists event monitoring as one of the 100s (1/100s) of NIST …

    Read more
  • Hit A Fiduciary Home Run With A Backup, DR, Cybersecurity Triple Play

    October 4, 2021 Jim Kandrac

    The old adage that the only secure computer is one that is not networked to anything has never been more true; however, it is also irrelevant even if it is funny. No computer can exist in a vacuum and is only useful if it is connected to other machines – and potentially lots of other machines. The level of malicious activity out there on the networks of the world has never been higher, and you had better get used to the idea that the situation is going to get worse every year, and the IBM i platform is absolutely …

    Read more

Previous Articles Next Articles

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25
  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle