IBM POWER vs. x86: The Key Differences

IBM POWER vs. x86: The Key Differences

What makes System i different from other platforms? A large part of the answer lies in the CPU architectures that System i servers use: System i relies on IBM POWER microprocessors, whereas most other modern computers and servers use the x86 architecture. And just what does System i’s use of POWER chips mean? Let’s take […]

Ironstream for ServiceNow Service Mapping

Ironstream for ServiceNow Service Mapping

Virtually everything in your business depends on IT running smoothly. For most enterprises, service outages result in lost productivity, missed opportunities for revenue, and sometimes severe reputational damage. Customers who have a bad experience with your website, get delayed customer service, or have trouble placing an order might take their business to the competition. Running […]

Log Forwarding with Ironstream for Splunk

Log Forwarding with Ironstream for Splunk

Over the past several years, Splunk has become a definitive leader in analyzing log data, giving its customers the power to turn the insights from this machine data into action. Splunk enables users to analyze and visualize this data in a single view, revolutionizing the way organizations discover security threats, monitor compliance requirements, and find (and […]

The Importance of IBM Z and IBM i for ITOM Visibility in ServiceNow

The Importance of IBM Z and IBM i for ITOM Visibility in ServiceNow

Virtually every successful business today relies on IT systems that can remain up and running 24×7. Downtime is expensive, and as computing plays a more critical role in so much of what we do, system downtime has become more costly than ever before. Customers who have a negative experience with your website or your customer […]

IBM i Security: Malware Defense and Privacy Protection Privacy

IBM i Security - How to Stop Malware and Protect Privacy in 2021

Cybersecurity has been a hot topic this year, with several high-profile news stories emerging that have underscored the potential costs for malware defense both in money and reputation, of large-scale cybersecurity breaches like ransomware attacks.  For IBM i shops, the level of attention is higher than ever. A study commissioned by Preciselyshowed that only 25% […]

Achieve Comprehensive Security with Multi-Level Access Control

Achieve Comprehensive Security with Multi-Level Access Control

Too many privileged users constitute a significant data management and security risk. However, providing users and systems with the least access necessary is complex. Administrators need tools for dynamic access management based on real-time behavior and context. 3 Multi-level access control features for comprehensive security Every day, there are thousands of requests to access an IBM i […]

Assure MIMIX for Db2 Mirror Is an Essential Complement to IBM i Db2 Mirror

Assure MIMIX for Db2 Mirror Is an Essential Complement to IBM i Db2 Mirror

In April 2019, IBM announced the 7.4 release of the IBM i operating system. Among the many advances in the operating system is the new Db2 Mirror feature. This exciting new capability synchronously replicates data in an active-active mode between Db2 nodes in the same data center. This ensures continuous Db2 data availability by preventing […]

Best Practices for Managing Elevated IBM i Authorities – Part 2

This article on managing elevated IBM i authorities was originally published in Enterprise Executive. Part one of this two part post focused on how elevated authorities can create the risk for a data breach, how IBM i users can obtain elevated authorities, the challenges of managing elevated authorities, and the role of elevated authority management […]

Best Practices for Managing Elevated IBM i Authorities – Part 1

This article on managing elevated IBM i authorities was originally published in Enterprise Executive. Part one of this two part post focuses on how elevated authorities can create the risk for a data breach, how IBM i users can obtain elevated authorities, the challenges of managing elevated authorities, and the role of elevated authority management […]

Using Exit Points to Fortify Your IBM i Security

Using Exit Points to Fortify Your IBM i Security

In the early days of the AS/400 and iSeries, the job of protecting the system was often as simple as managing user authorities and securing user access through menus. This is certainly no longer the case with today’s IBM i environments. Fully open to communicate with other systems across internal and external networks, and accessible […]