Blog

Blog

Powertech Multi-Factor Authentication Comparison Checklist

Heightened SecurityOthersPowertech MFALayers with existing exit programs for defense in depth✓Audit trail of failed and successful MFA attempts✓Send authentication events to a SIEM solution✓Audit trail of all configuration changes✓Send configuration change events to a SIEM solution✓Works with Single Sign On (SSO)✓Multiple authentication methods (biometrics, mobile, etc.)✓Monitoring and reporting...
Blog

Reduce Downtime on IBM Power with Live Partition Mobility (LPM)

According to the IBM i Marketplace Survey, nearly half of businesses rank High Availability (HA) and Disaster Recovery (DR) among their top IT concerns. A key component of this is minimizing downtime during planned server maintenance, whether upgrading to the latest IBM Power hardware, or applying disruptive critical platform firmware and VIOS updates. With cybersecurity as the top IT concern,...
Blog

Powertech Antivirus Comparison Checklist

Discover the qualities that set Powertech Antivirus apart, including native scanning for IBM Systems, a commercial grade scan engine, and exceptional support.
Blog

3 Ways Malware Can Reach Your IFS

It's true that IBM i can't be infected by a PC virus. It's also true that the IFS can act as a host and spread malicious programs throughout your environment.
Blog

Malware, Ransomware, and Viruses vs Your IBM i Server

Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.
Blog

The 10 Principles of Automation

Our experts developed the following best practices for easing automation implementation and advancing automated operations over the course of 30 years of working to help businesses make their processes more efficient. Let the countdown begin!
Blog

Is the AS/400 Dead?

Many IT professionals still use the term AS/400. But can a platform that was introduced in 1988 still be relevant today? The answers typically surprise people.