Resources

Datasheet

SecureCare for IBM i

Discover how SecureCare for IBM i makes it easy for your team to give the platform the security and compliance attention that it deserves.
On-Demand Webinar

What Are My Options for IBM i HA/DR and Backups?

When it comes to HA/DR and backups for IBM i, the good news is you have options.The bad news? You have a lot of options.Whether you’re looking to shield your data from natural disasters, protect your organization from security events, reduce the workload associated with performing backups, or locate cost-effective HA/DR options, IBM Champion Tom Huntington can help you find your IBM i’s perfect HA...
On-Demand Webinar

2025 IBM i Marketplace Survey Results Revealed

Watch this webinar to hear our panel of IBM i experts discuss exclusive insights from the 2025 IBM i Marketplace Survey results and what they mean for the IBM i community as we begin the new year.
Guide

2026 IBM i Marketplace Survey Results

Report Table of Contents:1. Introduction & Survey Highlights (current page)2. IBM i in the Data Center3. IT Initiatives & Trends4. Outlook for IBM i5. Demographics6. Resources...
Datasheet

Fortra and AIX

Fortra is dedicated to helping AIX customers improve the security and efficiency of their operations. Discover Fortra's variety of AIX offerings in this solutions brief.
On-Demand Webinar

2025 IBM i Executive Briefing

Watch our 2025 IBM i Executive Briefing to learn more about how we’re honoring our commitment to the IBM i, including what we’ve been working on in 2024 and what’s to come in the new year.
Blog

3 Ways Malware Can Reach Your IFS

It's true that IBM i can't be infected by a PC virus. It's also true that the IFS can act as a host and spread malicious programs throughout your environment.
Blog

Malware, Ransomware, and Viruses vs Your IBM i Server

Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.