ibm aix

Protection against malware: IBM AIX has your back

IBM Systems Lab Services, Power Systems, Security

“How can we protect our IBM AIX systems from malware attacks?” As a cyber security consultant, I come across this question more than any other when it comes to securing servers running IBM AIX. Most security breaches today are based on malware attacks, especially in banking sector. The infamous FASTCash malware has infected many banks’ ...read more


Application modernization with IBM Cloud Private on IBM Power Systems

Cloud computing, IBM Systems Lab Services, Power Systems

Leading companies are realizing that cloud is how to deploy IT, not where. Cloud capabilities have become a prerequisite for consuming IT resources, and organizations are now focusing on modernization of applications with a cloud native approach. You have many approaches for moving into the cloud, including: Modernizing and optimizing your existing on-premises applications Creating ...read more


Simplify your AIX environment with hyperconverged infrastructure

AI, Cloud computing, Ecosystem & partners...

Do you think that the AIX operating system is no longer relevant in this era of the private cloud? If so, you may want to reconsider that point of view. The cost efficiency of public cloud is certainly changing the landscape in profound ways, and the traditional constructs of on-premises IT need to make room ...read more


IBM AIX top trends for 2018

AI, Cloud computing, IBM Systems Lab Services...

Today’s businesses demand infrastructure that’s secure, highly available and able to adapt quickly to changing business needs. They need innovative ways to deliver services to their customers. IBM AIX delivers these capabilities and more, and that’s why it’s still at the core of many IT ecosystems across industries. When you’re running mission-critical workloads on IBM ...read more


2018 is the year of security: Are you secure enough?

Data security, IBM Systems Lab Services, Power servers...

Multiple security advisories in the recent past have shown how tirelessly security researchers work to identify and address vulnerabilities. With the extensive reach of the Internet, the digital space has become a hacker’s world. Keeping your IT environment protected is an important part of any enterprise IT strategy. Having a vulnerability doesn’t necessarily mean something ...read more


Who do you trust with your IT security?

Data security, Encryption, Hybrid cloud...

Security is a word that’s used to cover many aspects of IT, and it’s a top concern for organizations today, but there’s another important word related to the vendors of IT security products and solutions that safeguard your business: trust. Securing your business data and applications from malicious access or tampering rests on trust in ...read more