• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Raz-Lee Simplifies MFA for IBM i

    April 24, 2024 Alex Woodie

    The need for multi-factor authentication (MFA) has never been higher, as cybercriminals continue to compromise corporate and governmental systems to steal data and hold systems for ransom. That market need has led Raz-Lee Security to add several new features to its MFA solution that should help its customers stop, or at least significantly slow, unauthorized access to IBM i.

    Raz-Lee Security has sold MFA as part of its comprehensive iSecurity suite for several years, going back at least to December 2021, according to the company’s release notes for the product. With this month’s update to Raz-Lee MFA, the company has …

    Read more
  • Raz-Lee Adds Zero-Trust Features To IBM i Firewall

    March 18, 2024 Alex Woodie

    IBM i shops that are looking to implement a zero-trust security posture in their IBM i systems may want to check out Raz-Lee Security. The software company has added micro-segmentation capability to its iSecurity Firewall product, giving IBM i shops another level of control over their networks.

    Zero-trust is one of the more promising methods to secure an internal network these days, as it requires users to be authenticated, authorized, and continuously validated before being granted access to internal applications or data. It has been widely adopted in corporate networks as one aspect of a strong defense, particularly in Windows …

    Read more
  • IBM i Community Shares 2024 Predictions

    January 15, 2024 Alex Woodie

    Spaceship Earth has completed another trip around the Sun, which means one thing: Time for 2024 IBM i predictions! Hopefully you enjoy this year’s predictions, which seem to sport a good mixture of optimism and realism.

    The future for IBM i is wide open – open source, that is, says Liam Allan, the creator of Code for IBM i and a software developer for IBM i.

    “My prediction is pretty simple. Businesses will continue to invest in themselves through the power of open source,” Allan says. “Whether it be using dev tools, open source runtimes like Node.js, or even newer …

    Read more
  • What the Latest ALL400s Survey Tells Us About the IBM i Community

    October 18, 2023 Alex Woodie

    What is the most popular development tool in the IBM i community? What technology exists in nearly every shop? What BI tools are in use? And what activities are sitting in the IT backlog’s of IBM i shops? These are some of the questions that ALL400s answered with the latest edition of its IBM i community survey.

    You may have heard about ALL400s as the comprehensive list of IBM i customers around the world. John Rockwell, the Florida man behind ALL400s, does his best to keep the list as updated as possible.

    In addition to the list, Rockwell has put …

    Read more
  • Raz-Lee Updates Anti-Ransomware

    August 16, 2023 Alex Woodie

    Ransomware is not the summer blockbuster that it was in 2021, when hundreds of unprepared organizations across the country succumbed to attacks. But neither has ransomware disappeared as a security problem. In fact, it’s probably a good idea to stake out a ransomware strategy, which could involve deploying Raz-Lee Security’s unique IBM i software.

    Raz-Lee Security rolled out its Anti-Ransomware product back in the summer of 2018, well before the huge uptick in attacks that occurred in 2021. The software works by first detecting ransomware attacks, which would typically target files in the IFS. It then would take action, …

    Read more
  • Two Weeks Of Webinars On IBM i Security

    August 29, 2022 Timothy Prickett Morgan

    Security through obscurity was never a good OS/400 and IBM i security strategy, even though it was a commonly held belief by many in the base. Over the decades, the interconnected of systems has become more pronounced and security threats in the IT world have ramped up and – there are related, but not exclusively causal, relationships between these two phenomena. Suffice it to say, the need to be more proactive about system and application security has never been greater.

    Well, unless you count next year. And the year after that. And the year after that. . . . …

    Read more
  • IBM i Community Predictions for 2022, Part 2

    January 12, 2022 Alex Woodie

    The new year is upon us, which means it’s time for predictions. We continue where we left off on Monday with our second installment of predictions from the IBM i community.

    The way Fresche Solutions Chief Product Officer Marcel Sarrasin sees it, 2022 will be a period of heightened competition in the business jungle.

    “Technology advancements and changing markets will drive new competitive threats in 2022, creating the urgent need for new digital solutions to help companies thrive, survive and grow,” Sarrasin says. “Focus will be on new IT products and applications that will deliver improved business processes, pave the …

    Read more
  • IBM Offers Free Security Check for IBM i

    November 8, 2021 Alex Woodie

    IBM i shops that are concerned about security – and really, who isn’t concerned about their security these days? – may be interested in receiving a free security check from the experts at IBM Systems Lab Services.

    The IBM i Security Quick Check, as the free offering is called, was introduced by IBM in October as a way to help IBM i shops pinpoint the areas where their servers are susceptible to external attacks, insider threats, and malware.

    The security check will let organizations know where the security vulnerabilities exist in their IBM i configurations, according to a blog post …

    Read more
  • Ransomware Epidemic Hits Epic Proportions, And IBM i Shops Take Notice

    May 17, 2021 Alex Woodie

    The ransomware outbreak hit home for millions of Americans last week when attackers shut down a major East Coast pipeline as well as a hospital network on the West Coast. For IBM i shops, the events are a potent reminder to re-evaluate network security and data protection systems to ensure they’re resilient from attack.

    You could be forgiven for thinking you were watching an episode of Mr. Robot last week as news spread of the shutdown of Colonial Pipeline network, which provides 45 percent of the gasoline for the entire East Coast of the United States through 5,500 miles of …

    Read more
  • Raz-Lee Simulates Ransomware Attack on IBM i

    August 12, 2020 Alex Woodie

    How would your IBM i server react to a ransomware attack? Would it successfully repel the invaders, or would it give the bad guys what they’re after: chaos and bitcoin? Simulating a ransomware attack is the gist of a new feature in Anti-Ransomware from Raz-Lee Security, which recently shipped a new release of the software.

    Raz-Lee Security debuted Anti-Ransomware back in 2018, a year after a pair of widespread ransomware attacks (WannaCry and Petya) made the computing world sit up and take notice of the new security threat blossoming on the Internet.

    Anti-Ransomware uses a rules-based approach to detect …

    Read more

Previous Articles

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle