IBM POWER vs. x86: The Key Differences
What makes System i different from other platforms? A large part of the answer lies in the CPU architectures that System i servers use: System i relies on IBM POWER microprocessors, whereas most other modern computers and servers use the x86 architecture. And just what does System i’s use of POWER chips mean? Let’s take […]
Ironstream for ServiceNow Service Mapping
Virtually everything in your business depends on IT running smoothly. For most enterprises, service outages result in lost productivity, missed opportunities for revenue, and sometimes severe reputational damage. Customers who have a bad experience with your website, get delayed customer service, or have trouble placing an order might take their business to the competition. Running […]
Log Forwarding with Ironstream for Splunk
Over the past several years, Splunk has become a definitive leader in analyzing log data, giving its customers the power to turn the insights from this machine data into action. Splunk enables users to analyze and visualize this data in a single view, revolutionizing the way organizations discover security threats, monitor compliance requirements, and find (and […]
The Importance of IBM Z and IBM i for ITOM Visibility in ServiceNow
Virtually every successful business today relies on IT systems that can remain up and running 24×7. Downtime is expensive, and as computing plays a more critical role in so much of what we do, system downtime has become more costly than ever before. Customers who have a negative experience with your website or your customer […]
IBM i Security: Malware Defense and Privacy Protection Privacy
Cybersecurity has been a hot topic this year, with several high-profile news stories emerging that have underscored the potential costs for malware defense both in money and reputation, of large-scale cybersecurity breaches like ransomware attacks. For IBM i shops, the level of attention is higher than ever. A study commissioned by Preciselyshowed that only 25% […]
Achieve Comprehensive Security with Multi-Level Access Control
Too many privileged users constitute a significant data management and security risk. However, providing users and systems with the least access necessary is complex. Administrators need tools for dynamic access management based on real-time behavior and context. 3 Multi-level access control features for comprehensive security Every day, there are thousands of requests to access an IBM i […]
Assure MIMIX for Db2 Mirror Is an Essential Complement to IBM i Db2 Mirror
In April 2019, IBM announced the 7.4 release of the IBM i operating system. Among the many advances in the operating system is the new Db2 Mirror feature. This exciting new capability synchronously replicates data in an active-active mode between Db2 nodes in the same data center. This ensures continuous Db2 data availability by preventing […]
Best Practices for Managing Elevated IBM i Authorities – Part 2
This article on managing elevated IBM i authorities was originally published in Enterprise Executive. Part one of this two part post focused on how elevated authorities can create the risk for a data breach, how IBM i users can obtain elevated authorities, the challenges of managing elevated authorities, and the role of elevated authority management […]
Best Practices for Managing Elevated IBM i Authorities – Part 1
This article on managing elevated IBM i authorities was originally published in Enterprise Executive. Part one of this two part post focuses on how elevated authorities can create the risk for a data breach, how IBM i users can obtain elevated authorities, the challenges of managing elevated authorities, and the role of elevated authority management […]
What the California Consumer Privacy Act (CCPA) and Similar Regulations Mean for You: Addressing IBM i Data Privacy – Part 2
This article on the California Consumer Privacy Act (CCPA) was originally published in Enterprise Tech Journal. Part one of this two part post focused on an overview of the CCPA regulations and the responsibility of IT departments when handling data privacy regulations. This part covers the protection of IBM i data. Obscuring sensitive IBM i […]
Using Exit Points to Fortify Your IBM i Security
In the early days of the AS/400 and iSeries, the job of protecting the system was often as simple as managing user authorities and securing user access through menus. This is certainly no longer the case with today’s IBM i environments. Fully open to communicate with other systems across internal and external networks, and accessible […]