• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Is Information Overload Hurting IBM i Security?

    September 28, 2020 Alex Woodie

    What is wrong with IBM i security? If you look at surveys and reports, you would be hard pressed to find something that is not broken. From excessive authority and ransomware, to exit programs and default passwords, it can feel as if IBM i servers are rife with security failures.

    IBM i shops are certainly aware of the security shortcomings. Security has been rated the number one concern in each of the past two IBM i Marketplace studies conducted by HelpSystems. In the most recent report, 77 percent of respondents rated security a top concern, the highest percentage …

    Read more
  • Maxava Hits Multiple Targets With The Same HA Arrow

    September 16, 2019 Timothy Prickett Morgan

    Downtime is never a good thing for any business, except maybe for those who sell high availability clustering and disaster recovery software for a living. And to be honest, these companies explicitly want to keep the downtime and the recovery time to the smallest period as possible. The fear of downtime should be enough to motivate us all to replicate out systems.

    But sometimes, just having two systems in a high availability cluster is not enough. Some companies need belts with their suspenders, and maybe even a bunch of different belts because they really can’t be down. To that end, …

    Read more
  • Raz-Lee Offloads Virus Scanning from IBM i with ICAP

    May 15, 2019 Alex Woodie

    Raz-Lee Security is providing IBM i shops another option when it comes to anti-virus software by offering an ICAP client that offloads CPU-intensive virus scanning activities to an external server. The new solution is being sold as an extension to Raz-Lee’s existing Anti-Virus solution.

    While the IBM i operating system is essentially immune to PC viruses, they still pose a threat to IBM i shops, which typically have a smattering of Windows desktops and servers on the network. The problem is that Windows viruses (and assorted other malware) can infect the IBM i server’s Windows-like Integrated File System (IFS), where …

    Read more
  • Does Db2 Mirror Kill The Market for Third Party HA?

    May 6, 2019 Alex Woodie

    IBM launched Db2 Mirror for i two weeks ago to great acclaim, as the clustering technology puts IBM i on par with how most other major systems provide continuous availability. But will Db2 Mirror destroy the platform’s heritage of high availability solutions? IT Jungle asked IBM and the biggest providers of logical replication solutions, and the answer is no. Here’s why.

    The first thing to understand about Db2 Mirror is that, at heart, it’s a database clustering technology. IBM figured out a way to make a single instance of Db2 for i run on two separate systems, in an active-active …

    Read more
  • Raz-Lee Debuts Anti-Ransomware For IBM i

    June 18, 2018 Alex Woodie

    Despite its reputation as a secure digital fortress for back office automation, the IBM i server is subject to all manner of modern security threats. That includes ransomware, which can work its way onto mapped IFS drives and render business documents stored on the IBM i server useless. Raz-Lee Security recently launched a new solution aimed at combatting the spread of ransomware on IBM i.

    Today’s business environment rewards companies that embrace openness. Companies are encouraged to open up their mainframes and IBM i servers and leverage the data and business processes they contain using APIs, microservices, and modern user …

    Read more
  • IBM i Data Vulnerable, Security Report Says

    May 9, 2018 Alex Woodie

    HelpSystems last month published its 15th annual State of Security report, in which it summarizes the security checks that it performs on its clients and prospects’ IBM i servers over the course of a year. This year’s report covers 158 systems, and if the results are to be extrapolated to the IBM i installed base as a whole, then there’s a lot of vulnerable data out there.

    If you’ve followed the HelpSystems and PowerTech reports over the years, then you’ve likely been made award of the irony that lies at the heart of IBM i security. The contradiction is this: …

    Read more
  • Tooling Around With IBM i Access Client Solutions Announcements

    February 21, 2018 Dan Burger

    Access Client Solutions (ACS) received several feature/function enhancements when the Technology Refreshes were announced last week with a little something for end users, system administrators, and database engineers. Although nothing stands out as a major item, this is an incremental release fulfilling user-requested features.

    The 5250 emulator is a good example. It’s a key technology that is likely the most used component in ACS, but it’s been around for so long it’s easy to think there’s nothing new in emulation. But users never seem to cease to ask for something new: support for Chinese CCSID 1371 is one of those …

    Read more

Next Articles

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle