• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Raz-Lee Debuts Anti-Ransomware For IBM i

    June 18, 2018 Alex Woodie

    Despite its reputation as a secure digital fortress for back office automation, the IBM i server is subject to all manner of modern security threats. That includes ransomware, which can work its way onto mapped IFS drives and render business documents stored on the IBM i server useless. Raz-Lee Security recently launched a new solution aimed at combatting the spread of ransomware on IBM i.

    Today’s business environment rewards companies that embrace openness. Companies are encouraged to open up their mainframes and IBM i servers and leverage the data and business processes they contain using APIs, microservices, and modern user …

    Read more
  • IBM i Data Vulnerable, Security Report Says

    May 9, 2018 Alex Woodie

    HelpSystems last month published its 15th annual State of Security report, in which it summarizes the security checks that it performs on its clients and prospects’ IBM i servers over the course of a year. This year’s report covers 158 systems, and if the results are to be extrapolated to the IBM i installed base as a whole, then there’s a lot of vulnerable data out there.

    If you’ve followed the HelpSystems and PowerTech reports over the years, then you’ve likely been made award of the irony that lies at the heart of IBM i security. The contradiction is this: …

    Read more
  • Tooling Around With IBM i Access Client Solutions Announcements

    February 21, 2018 Dan Burger

    Access Client Solutions (ACS) received several feature/function enhancements when the Technology Refreshes were announced last week with a little something for end users, system administrators, and database engineers. Although nothing stands out as a major item, this is an incremental release fulfilling user-requested features.

    The 5250 emulator is a good example. It’s a key technology that is likely the most used component in ACS, but it’s been around for so long it’s easy to think there’s nothing new in emulation. But users never seem to cease to ask for something new: support for Chinese CCSID 1371 is one of those …

    Read more

Next Articles

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM i 7.3 TR12: The Non-TR Tech Refresh
  • IBM i Integration Elevates Operational Query and Analytics
  • Simplified IBM i Stack Bundling Ahead Of Subscription Pricing
  • More Price Hikes From IBM, Now For High End Storage
  • Big Blue Readies Power10 And IBM i 7.5 Training for Partners
  • IBM Delivers More Out-of-the-Box Security with IBM i 7.5
  • Groundhog Day For Malware
  • IBM i Community Reacts to IBM i 7.5
  • Four Hundred Monitor, May 11
  • IBM i PTF Guide, Volume 24, Number 19

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle