Previous Webinar- 3-Ways-to-Protect-Your-IBM-i-from-Ransomware

3 Ways to Protect Your IBM i from Ransomware

Although ransomware doesn’t attack the IBM i operating system or native DB2 libraries, it can encrypt and rename Integrated File System (IFS) stream files that support native IBM i applications and store user documents.   

Ransomware attacks can disable critical IBM i processing by damaging IFS-based configuration settings and data files. Ransomware disables business processing, breaches security, and wastes money and time in recovering from an attack.   

In this recorded webinar we discuss:

• How ransomware attacks IFS stream files

• Critical IBM i security settings that protect your IFS from ransomware

• Recovery techniques and best practices to consider when an attack occurs

• Preventing, stopping, and isolating IBM i ransomware activity in real-time

Mel Zucker

Mel Zucker is a 30-year IBM veteran, who worked in AS/400 and IBM i customer engineering, program support, system engineering, and technical consulting. 

© 2021 Software Engineering of America

This is your setting for either accepting or rejecting cookies on our site. Select to either accept or reject cookies.

009 Ted (Macksam) Talks IBM i

009 On this week’s episode we have Ted Macksam, VP of Information Technology from Hatco.  Innovation isn’t just talked about at Hatco – it’s a way of life!  Ted shares how Hatco leverages IBM i at the center of all the cool things they are doing.  Why?  Because everything just runs better with IBM i.  They are using open source, pushing the envelope with SQL, temporal tables, and stored procedures, using POWER HA and Flash Copy for disaster recovery – and they test it annually, so they know it works.  Ted is not a one-man band; he has an amazing team, and they are the reason Hatco is so successful. Ted’s contact information and social: Email: [email protected] – 262-993-0172HATCOOne incredible Th(i)ng!  Products, gadgets, recipes, music, or things we are loving right now.Tony’s picks for this week: Ruggable – with 2 dogs in the house, it’s the only way to go!    Peg’s pick for the week:   Peg has 2 picks this week.  1. Her daughter heading back to school – in person!  2. And watermelon!  Ted’s pick for the week:Pickleball!  Ted racket of choice is from Gearbox.  It’s not just for the retired folks!  Upcoming Events: POWERUp21 October 4-6 in Virginia Beach, VA.  This event is LIVE onsite and simulcast over the web.  Discount hotel rates available for the weekend before or after the conference.  Bring the family for a little beach time and don’t forget to pack your swimsuit! RPG & DB@ Summit October 20-26, 2021 This episode is sponsored by… COMMON https://www.common.org/home Midrange Dynamics Change Management Software – Built for IBM i modernization! https://www.midrangedynamics.com/ Interested in sharing your IBM i story?  Want to sponsor the podcast?  We want to hear from you!  Reach out to Peg at [email protected]

Why API Management?

Learn more about API Management → http://ibm.biz/explore-api-mgmt-guide
Check out IBM API Connect → http://ibm.biz/start-ibm-api-connect
Check out IBM Cloud Pak for Integration → http://ibm.biz/pak-for-integration

Node.js, GraphQL, Spring Boot, Golang, these are just a few options we have as technologist to build modern API’s today. So, it is imperative that organizations implement a strategy to manage their diverse API ecosystem so they can respond to rapid changes in customer demand.

In this lightboard video, Jamil Spain with IBM Cloud, breaks down some common terms that come up when discussing API development, and then takes us a step deeper as he shows how an API Management solution can provide more flexibility for your architecture, enhanced security options, and key analytics to track the performance of your APIs.

Get started on IBM Cloud at no cost → http://ibm.biz/try-free-account-today
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now

#APIManagement #APIs #IBM

Verified by MonsterInsights