fbpx
Contact us for Pricing or Questions:      (888) 682-5335          *We Ship Worldwide
Search Products

Used IBM Servers | New Power9 Systems | QRadar SIEM Security

IBM i 7.4 TR2 Announcement Details 5770-SS1 V7R4

IBM i 7.4 TR2 Announcement Details 5770-SS1 V7R4
IBM i 7.4 TR2 Details: V7R4 Technology Release 2 Announcement for 5770-SS1 IBM i V7R4 TR2 Technology Release 2 for IBM POWER9 and POWER8 Systems with OS400 was announced on May 15, 2020, adding many new enhancements for security, encryption, virtualization, high availability, backup and recovery, web services, DB2 database, administration, architecture, APIs, development and many other major improvements that affect operating system components, software licenses and hardware features. IBM i 7.4 TR2 is supported on select Power Systems servers with POWER9 or POWER8 processors and OS400 operating systems. IBM i customers using Blades, PureFlex systems and older Power generation processors must first upgrade AS400 system hardware. IBM i Software Maintenance and Support is required for applying V7R4 Technology Refresh 2. IBM software maintenance and support allows OS and software release updates electronically, telephone support during the normal business hours, and provides Severity 1 assistance 24 hours a day, every day of the year. For additional details, go to the IBM Support Handbooks page. For a limited time, IBM i, iSeries and AS400 customers on older Power system models with expired maintenance and support can for take advantage of IBM’s Amnesty Program to get systems back on maintenance and support without a penalty or after license fee for a limited time. This offer allows companies to take advantage of free OS and software license upgrades for fixes, performance improvements, security updates, as well as access to IBM support. The IBM Software Maintenance Amnesty Program is available for select Power and Storage System models licensed and installed in the U.S. To qualify, customers must reinstated system maintenance no later than August 31, 2020. Contact Midland for details about the Amnesty program or to reinstate your system’s maintenance and support. IBM i 7.4 TR2 Details Transport Layer Security (TLS) has been enhanced to leverage POWER9 capabilities for low-level cryptography instructions. Obtain IBM i Security updates with the latest HTTP PTF Group PTF SF99662. View PTF MF66828 to improve data transfer rates for AES encryption GCM cipher suites. Elliptic curve Diffie-Hellman key exchange using Curve25519(x25519) and Curve448(x448) are now supported and enabled named elliptic curve...
Continue reading

Endpoint Security: Managed Security Service Provider (MSSP)

Endpoint-Managed-Security-MSSP
Endpoint security management might be best handled by a Managed Security Service Provider (MSSP) to monitor and manage, because over 70% of cybersecurity breaches originate from endpoint devices, and almost every company admits they lack the required resources. Our endpoint security management services provide a centralized monitoring and remediation service that proactively discovers device vulnerabilities using real-time cybersecurity AI, monitors for required services needed for protection, blocks malicious applications and ensures endpoints are up to date with required patches according to defined policies. Hackers know endpoints are the easiest way to penetrate a network, and companies’ seldomly have multiple security controls in place that would prevent unauthorized access. Network vulnerabilities caused by mobile devices and remote employees are the number one reason companies need to adopt strict endpoint security controls to prevent malicious intent. A centralized endpoint management solution can automate network access based on polices by identifying the device’s signatures, security level and configuration. The endpoint security management product or service you use needs support all the devices and OS versions you want to allow access your network and which applications and services can be used to connect to your network. All event logs should also be forwarded to a Managed SIEM service for complete visibility. Our endpoint security management services can be for customer owned Carbon Black, Palo Alto, Check Point, Sophos, CrowdStrike, McAfee or Symantec endpoint security solutions. Alternatively, our no charge endpoint assessment service can help recommend the best endpoint security management solution for your environment. Endpoint security management is perhaps one of the most critical components needed today to protect against cybersecurity threats and other malicious plots which require monitoring and prevention efforts 24X7, 365 days a year. What do endpoint security management solutions protect against?Ransomware attacks are the result of a hacker gaining access to an endpoint or multiple endpoints on the network, and then proceeds to encrypt files on these devices and makes them useless. Most ransomware attacks are successful, and will require an exorbitant amount of time to decrypt your files or you will need to resort to restoring your files from a backup. The hackers...
Continue reading

8 Signs it's time to consider getting your first small business server

Small Business Servers
Is it the right time for you to get a small business server?  While the process of growth within small businesses can be exciting, business owners are often faced with technology pains that accompany a growing team. With more people come more computers and the once effective peer-to-peer method of managing computers when there were just a handful of people no longer proves to be effective or sustainable. With this growth in your business, it may be time to consider getting a small business server. If you are beginning to manage a small fleet of computers that share printers, scanners, internet access or information, then a small business server may certainly ease your growing pains. Today’s servers are no longer designed with just large organizations in mind as they were in the past. Servers are now made to help simplify and grow businesses of ALL sizes and can be purchased at an affordable price point. Servers allow for non-stop, 24/7 business operations and play a big part in a productive organization’s processes.   Let’s take a look at some of the sure signs it’s time to consider a small business server for organization. Signs you need a small business server #1 – Your business requires files and data that currently resides on more than one computer to be secured from unauthorized access, corruption or total loss #2 – You manage multiple computers that share scanners, printers, fax machines, information or internet access #3 – You want the flexibility of accessing your files while away from the office, backing up business-critical items that reside on multiple computers or restoring deleted or previous versions of files #4 – You require a CRM (Customer Relationship Manager) software and accounting programs to communicate with your customers and vendors #5 – You would like to dictate user rights and abilities to access certain files and data on the network  #6 – If a user’s computer goes down, you’d like them to be able to sign into another computer and resume their work #7 – You need employees to share software tools and databases #8 – You...
Continue reading

IBM Linux server hardware performance and software license costs

IBM Linux server hardware performance and software license costs
IBM Linux server hardware performance and software license costsThe best Linux server hardware for enterprise open-source ecosystems will be the platform that delivers the best processor, memory and disk performance per core. Judging by the number of discussions in customer support communities, technical articles and blog posts on various Linux server performance troubleshooting, there is clearly a need for a better performing Linux server for both scale up and scale out infrastructures. This article will explain the importance of selecting the best performing hardware for your Linux server farm and how it affects software license costs. IBM POWER9 Linux Server Hardware models: 9008-22L S922 1 or 2 Processors, 8-12 Cores, 4TB Memory9183-22X IC922 1 or 2 Processors, 12-20 Cores, 2TB Memory9006-12P LC921 1 or 2 Processors, 16-40 Cores, 1TB Memory9006-22P LC922 1 or 2 Processors, 16-44 Cores, 1TB Memory9009-41A S914 1 Processor, 4-8 Cores, 1TB Memory9009-42A S924 1 or 2 Processors, 8-12 Cores, 4TB Memory9009-22A S922 1 or 2 Processors, 4-10 Cores, 4TB Memory Should I scale up or scale out my Linux server farm?A scale up Linux server environment enables economies and performance of scale for all levels of the IT infrastructure, by reducing the number of physical systems and underlying ecosystem components that will require administration and support. Scaling up means less human resources needed, less software licenses, less hardware, less failures, less power, less vulnerabilities and less everything else that negatively effects costs. In addition, a scale up environment can have power and resources available to share much more efficiently than a scale out infrastructure, which must distribute workloads across multiple servers, will increase software licenses, as well as infrastructure and system administration costs at every level. Almost every virtualized Linux server environment can benefit from a scale up server approach to save money and improve performance. IBM Power9 Linux server performance results have consistently shown it is the most cost effective and fastest midrange Linux platform to run database, ERP, big data analytics, Java, video, cloud, Nutanix, web, file system, DevOps. Any CPU, I/O intensive or memory demanding Linux server workload running NoSQL like MongoDB, Relational DBMS like MySQL, PostgreSQL, MariaDB and Oracle, or Hadoop and Spark big...
Continue reading

Is Power9 the best performing Linux server? Q&A With IBM Gold Partner, Midland Information Systems plus real world examples.

Linux-Servers
  IBM Power9 Servers may be the best Linux server to run your applications. IBM Power Linux servers have a proven history of delivering over twice the performance per core compared to industry leading x86 server brands. IBM Power Linux servers have also proven to deliver the lowest cost of ownership compared to other Linux servers running on x86 hardware. Although there is no one single answer to this question, the two statements address what most people want to know when comparing Linux server workloads, such as: application server, database server, cloud server, SAP server, analytics server, business intelligence server, web server, media server, HCI or like x86 workloads. IBM Power Linux Server Q&A The questions and answers in this article are based on real-life business scenarios, independent x86 Linux server comparison case studies, industry experts, competitor specifications, vendor testing and other fact based benchmark laboratory testing results. The questions revolve around the important business decisions companies must make about how to lower licensing costs, operating costs and/or how to improve application response times for business units. Fact: 80 percent of the Fortune 100 companies use IBM Power Systems. Q: What applications can I run on a IBM Power Linux Server? A: Any x86 Linux server application running on Ubuntu Server, SUSE Linux Enterprise Server and RedHat Enterprise Linux is supported. In addition, the community versions of Linux server like Debian, openSUSE, CentOS, Fedora and others can also run on IBM Power Linux servers. Q: Does an IBM Power9 Linux server cost more than an x86 server? A: Yes, maybe and no. When comparing the upfront hardware costs of purchasing a IBM Power Linux server solution to a comparable x86 server solution, x86 hardware may be at times less expensive and sometimes not. However, after accounting for lower licensing costs, reliability, implementation time, scalability, performance, ongoing management and security, IBM Power9 Linux servers have a much lower cost of ownership compared to alternative x86 servers. Q: Why does a IBM Power Linux server have a lower TCO compared to an x86 server? A: IBM Power systems provide better performance per core,...
Continue reading

SFTP Client Software for IBM i iSeries AS400 Bank File Transfers

SFTP Client Software for IBM i iSeries AS400 Bank File Transfers
SFTP client software or Secure FTP that uses SSH (Secure Shell) and PGP encryption for secure file transfer over the SSH2 protocol as defined by the Internet Engineering Task Force (IETF) SSH (SECSH) working group. Customers with an AS400, iSeries or IBM i can use the Secure FTP (SFTP) for to automate secure file transfer to their bank or other trading partners in just a few minutes. Banks like Bank of America, BankOne, CitiGroup, JP Morgan Chase, State Street, US Bank, Vanguard and Wells Fargo have additional file transfer requirements such as PGP encryption, ASCII armored, RSA public key exchange, sign and verify, key import and export, and other common secure file transfer processes which the IBM i SFTP software also supports. Banks also commonly require trading partners use an SFTP client software that supports their environment, such as their exchange, EDI or Value Added Network (VAN) services, including GE eXchange Services (GXS), Sterling, Inovis, Pantellos and Advantis. The IBM i SFTP client software supports these services and allows for Public Key and/or User ID and Password for authentication. A few banks will also have unique and complicated requirements for non-standard FTP ports, directory changes, file naming conventions and scripts that use special User and Password specifications. The IBM i Secure FTP (SFTP) software is very flexible and feature rich tool that supports these unique requirements, and many other complicated scenarios. Perhaps the most cost effective SFTP Client Software for IBM i, iSeries and AS400 systems on the market, includes free installation, configuration support and trials. Send us your IBM i system information, and we will send you a download link and walk you through the setup. Run the following command: CALL PGM(QLZARCAPI) Press F1 on the message at the bottom of the screen, press F10 to display the full message and send us the copy/paste. Common secure file transfer requirements for banks include Remittance Transfers, ACH Payments, Bank Statement Transfers and Image Processing. The IBM i Secure FTP software also supports FTPS (FTP over SSL 'implicit'), and provides the same file transfer, automation and data conversion features as the SFTP protocol provides, however most banks will...
Continue reading

6 Reasons Why You Should Choose IBM POWER9 for your Application Platform.

POWER9-Cover
IBM recently introduced their newest POWER servers with the POWER9 processor to the marketplace. Has your business has been debating staying on the IBM i platform instead of migrating your data to the cloud or to another OS platform like Linux Servers or another x86 server solution? You really should consider the benefits of the latest POWER9 systems are and IBM i 7.4.  The AS400 iSeries POWER lineup of servers has long held a reputation for reliability and security. IBM i is all about integration and innovation. Businesses running high-traffic, mission-critical applications are deploying IBM Systems in their own data centers and in the cloud.  Digital transformation initiatives like the the IoT, business process automation, mobile and analytics demand a lot of resources for planning and strategy. iSeries hardware requires less maintenance and fewer resources, so IT teams can focus on delivering on strategic projects.  Faster, Highly Flexible and More Resilient  Running POWER9 in your data center or in the cloud offers advantages like surprising technical flexibility and affordability compared to other systems running Linux, Windows or flavors of UNIX.   IBM POWER is like a technical fortress for data and applications which enable and run business systems like: Enterprise applications like SAP, JD Edwards EnterpriseOne and Infor XA (MAPICS) Disaster Recovery, Business Continuity, and High Availability Security monitoring and encryption. Business Intelligence and analytics applications which work with DB2. Artificial Intelligence and AI-powered Managed Security Service Providers Communication and file transfer If you are already running IBM servers in your IT environment, we’re likely preaching to the choir.  Let’s explore six of the many benefits of upgrading or converting to IBM POWER9 and the IBM i 7.x operating system.   1.  Technology Infrastructure Without Compromise  To keep pace with today’s fast-paced, digitally dependent business environment, companies of all sizes need stable, reliable technology infrastructure which can stand up to heavy workload. Businesses are deploying solutions like AI, the IoT and cloud on the IBM i platform because it provides an integrated platform without compromising on security, scalability or reliability.  POWER servers, like their AS 400 & iSeries predecessors, are world-renowned for reliability. Yet...
Continue reading

IBM i Saves Money for Companies in Multiple Ways

IBM i Saves Money for Companies in Multiple Ways
From its inception in the 1980s, the IBM AS400 and OS400 operating system has had many iterations and transformations over the years, but it has consistently maintained the distinguished honor of delivering businesses the lowest TCO midrange computing system in the industry. To this day, tens of thousands of businesses, including the largest companies in the world rely on the IBM i to run their most critical applications. There is no single reason, but collectively, the entire IBM i package of hardware, operating system, integrated database and all the features they encompass and provide businesses, is what contributes to the extremely low total cost of ownership that no other midrange computing system can provide. The IBM i POWER system platform itself, is a turnkey business system that requires almost zero IT staff to maintain on a daily basis. Case in point, a number of companies over the years have contacted Midland for assistance for a system no one at the company knew existed, until the day something stopped working. This triggered a man hunt, a door to a small closet being opened for the first time in recent history, and the discovery of a very dusty black box. These systems ran for a decade or more without a single failure, and in some instances, did not require any human interaction. Some of these older systems included System/36’s from the 1980s and first generation AS/400s from the 1990s. Hearing stories like these are amazing testaments to the rock solid architecture that is today known as the IBM i. Not to mention, these types of stories are completely unheard of for other midrange platforms. The key elements why businesses should consider an IBM i, and why executives might want to think twice before migrating off the IBM i:  - Lower License Costs - Lower Personnel Costs - Less Downtime - Faster Application Response Times From the outset, OS/400 was designed for ease of use, a key factor that has continued to save businesses money on system and database administration tasks. Most IBM i administration functions are automated today, with self-healing, self-configuring, self-tuning, self-protecting and like management...
Continue reading

The Real Cost of NOT Upgrading to POWER9

Upgrade to save
POWER System upgrades are often among the most prolonged and undervalued IT decisions. Why rush to invest in a POWER9 upgrade when your POWER7 or POWER8 server performance is perfectly fine? Truth is: over a 5-year span you may waste a good amount of cash maintaining those legacy systems instead of capitalizing on the true cost savings and many additional benefits a POWER9 server offers. Not a believer? Well here are the facts.Why Regular Hardware Updates Actually Save You MoneyLegacy IT modernization isn’t a persistent budget drain. On the contrary, regular updates save you a hefty sum in the long run. Here’s why:Increased Maintenance Costs The cost of maintaining an older POWER system gets steeper over time, especially for technologies nearing the end of support (EOS). Surely, you can always opt for paid extended support. However, doing so can double the normal yearly maintenance costs. In essence, extended support is a short-term patch that makes subsequent upgrades even more costly. If you are not already aware, IBM is ending support for many POWER7 servers in 2020 (10 POWER7 models to be exact). For most companies, the increase in both hardware and software maintenance costs alone should be enough reason to for a POWER9 upgrade. More on this topic in a bit. Higher Security RisksPOWER systems without IBM’s support cause significant risks to businesses, resulting in weakened defenses for AIX and IBM i software, the operating system and hardware. While your POWER systems won't stop running per se, IBM will no longer bear responsibility of creating patches and fixes to prevent cybersecurity breaches and other security vulnerabilities that could potentially inflict significant harm to your business. After assessing the costs of such a scenario, I believe most companies would agree the risks of an unprotected infrastructure would certainly justify a POWER9 upgrade.As a result of a 14 year joint research endeavor conducted by IBM and the Ponemon Institute, the pair were able to assess the detailed financial impact and consequences data breaches cost companies across every industry, including calculating the various cost and compliance factors for every stage of a response• In SMEs...
Continue reading

POWER9 in 2020: What’s Coming Ahead

POWER9 CPU
POWER9, IBM’s latest family of scale-up servers, has been around since August 2018. Since it’s debut, they received several new members, along with other hardware upgrades. In this post, we offer a quick recap of the new IBM releases in 2019, along with the outlook for 2020.  Before we dive into the updates, here’s a quick refresher on POWER9: New chips come with a 14 nm process (from 22 nm in POWER8), 8 billion transistors and peak bandwidth of 192 GB/s. The pipeline got a trim: 5 stages were eliminated from fetch to compute; 8 cycles were removed for floating-point operations. New hardware acceleration that includes enhanced on-chip acceleration, PowerAXON, Nvidia NVLink 2.0 and CAPI 2.0 Support for Power ISA v3.0. DDR4 DIMMs memory and higher memory capacity per socket.  Check our head to head comparison of POWER8 vs POWER9 for more insights. Key POWER9 Upgrades and Releases in 2019 As usual, IBM made a set of new feature announcements and hardware releases during spring/autumn 2019. Below is a brief recap of those: In August, the company released a new generation of mainstream SAS 2.5- inch flash drives POWER8 and POWER9 systems that come in 931 GB, 1.86 TB, 3.72 TB, and 7.45 TB capacities*. At the same time, they shipped an upgraded processor for the POWER E980 model, consisting of a six-core Cumulus process with a base speed of 3.58 GHz and a turbo speed of 3.9 GHz. Later in October, a new generation of SSD drives for POWER8 and POWER9 models was released in 387 GB, 775 GB, and 1550 GB capacities. As well, they upgraded the POWER S924 model to support 11-core or 22-core typical 3.45 - 3.9 GHz configurations in a 19-inch rack-mount. (Read more about IBM Solid State Drives Here) In addition, IBM published fresh performance benchmarks showcasing how POWER9 servers stack against earlier POWER8 releases. In short, newer servers can deliver up to 60% in a performance boost. Last, but not least, comes the IBM i 7.4's first Technology Refresh update since its original release. As per official notes: IBM i now supports the new...
Continue reading

IBM Power Solid State Drives SSD

AdobeStock_328713121
 How to increase IBM POWER System application performance running on IBM i, AIX and Linux Server with SSDs (Solid State Drives) Every IBM POWER System application performs significantly faster running on SSD (microsecond and nanosecond response times, compared to millisecond and seconds). Application performance on IBM POWER Systems experiencing slow query responses times, have intensive I/O requirements or are experiencing latency as a result of accessing data on hard disk drives, can improve performance using various database and query approaches. However, the most effective and usually quickest approach is to replace traditional HHDs with IBM Solid State Drives (SSD) using either Enterprise or Mainstream SSDs, depending on read and write requirements. Solid state drives have been available for IBM POWER Systems since IBM released the first POWER5 models, although the initial SSDs were cost prohibitive for most companies. Since their initial release, time and the refurbished market has made IBM SSDs cost effective for any company needing a quick and simple performance upgrade. In comparison to hard disk drives, SSDs run at the speed of memory capable of delivering tens of thousands more I/O operations per second for any IBM POWER System, providing queries, I/O intensive applications and aging IBM i, Linux Servers and AIX Power servers a massive performance boost. As a result, IBM POWER Systems can typically be configured to replace HDDs with a lot less SSDs and still achieve huge I/O performance boost and reduce related hardware costs of expansion units and IBM hardware maintenance. IBM Enterprise SSDs with eMLC (for write intensive database applications) and Mainstream SSDs (for read intensive with no more than 1 write per day) do not have the seek time performance bottlenecks of hard disk drives. IBM i POWER systems have a built in storage manager for the DB2 database that simplify and automate how data is used between ASPs, Libraries, DB2 database and physical storage types available utilizing preferences and calculations for maximum response times and performance costs that impact CPU and I/O. IBM SSDs provide users with almost instantaneous access to DB2 data, removing latency and I/O performance bottlenecks HDD spinning platters and arms cause. What are...
Continue reading

Managed SIEM Services: Evaluation and Pricing

managed-siemaas-msiem-socaas-mssp Managed SIEM SIEMaaS SOCaaS MSIEM MSSP
Managed SIEM Services (MSIEM, SOCaaS, MSSP, SIEMaaS) can provide companies with various levels of security services at a reasonable price including: Monitoring (threat hunting), vulnerability scanningReporting, alertingRoot cause analysisData encrichment and intelligence providing context about security incidentsRecommendations for containment and remediation stepsPerform actual remediation on behalf customerSIEM tuning and managed security services needed to augment deficiencies in expertise and staffing. Managed SIEM prices vary based on the volume of events per second (EPS) and the required level of services from the SIEM as a Service provider. To compare apples to apples, be sure to request a detailed SOW and clear SLA. Outsourcing SIEM management and other security services can significantly improve a company’s security posture, minimize risks and lower ongoing operating costs. Security companies typically have much better training and resources for security engineers and analysts than most companies can afford to pay for the level of monitoring required to maintain a secure environment.Contact us for Managed SIEM as a Service pricing for QRadar, AlienVault, Splunk or Exabeam, and view demo of how an advanced SOC implementation can minimize the risks and threats in your environment.   Is your SIEM always crying wolf? Are large number of false positives causing alert fatigue and overwhelming operators with unimportant alarms? Alert fatigue causes poor response times and prevents security engineers from responding to real security threats quickly. SIEMs with an over whelming number of alerts actually cause critical alerts to get missed. If SIEM alerts are not consistently triggering on actionable security threats, it means something is awry with the SIEM rules, event logs or both. Most SIEMs are still configured with default settings for Device Support Modules (DSMs), using regular expressions to extract and parse only a portion of the available data from the raw data, meaning they are not converting some of the most critical data from needed to identify and analyze threats. Furthermore, most SIEM DSMs will not parse the additional layers of the event logs using defaults, which is needed to create meaningful alerts minimize false positives. Most SIEMs are also missing critical log sources that provide necessary context to identify threats, which is...
Continue reading

IBM HMC Model Specifications and Comparisons

IBM-7042-CR9-IBM-7042-CR9-Hardware-Management-Console
The IBM Hardware Management Console (HMC) is a virtual hardware appliance used to manage and monitor IBM i, AIX and Linux server workloads running on Power9, Power8, Power7, Power6 and Power5 Systems. The IBM HMC uses built in terminal emulation software to connect and control Power system resources, services, virtualization features and order Capacity Upgrade on Demand. The IBM HMC can consolidate the monitoring and management of all Power systems in a company’s infrastructure that is supported by the HCM code. Every HCM model supports different Power system models based on the version of HMC code. For instance, the latest HCM models 7063-CR1, 7042-CR9, CR8, CR7, OE1 and OE2 all support Power9, Power8 and Power7 systems when running V9R1 HMC code, but not do not support IBM Power6 system models. If same the HMC has V8.8.7 code installed (which does not support Power9 system models), the HCM can also connect and manage Power6 systems. Similar to the HMC virtual hardware appliance, customers may choose to use HMC functions on a PowerVM-based environment running on a PowerLinux LPAR and using PowerVM NovaLink software. The IBM HMC hardware appliance and the PowerVM NovaLink features function the same as the HMC appliance. The PowerVM NovaLink uses a cloud architecture, that provides a direct OpenStack connection to a PowerVM server running on a PowerLinux partition. IBM provides upgrades for HMC code for each model, which can be downloaded from IBM Fix Central. The latest IBM HMC appliance model specifications and comparisons are provided in the below chart, and should be considered before upgrading your IBM Power system or purchasing a HMC. IBM HMC Model Specifications and Comparisons (in Newest to Oldest order)HMC ModelHMC CodePower GenerationProcessorMemoryDisk SpaceEthernetUSB PCI-XPCIePCI7063-CR1V9R1 M9xxPower9, 8 & 72.095 GHz32 GB4 TB547063-CR1V8.8.7Power8, 7 & 67042-OE2V9R1 M9xxPower9, 8 & 77042-OE2V8.8.7Power8, 7 & 67042-OE1V9R1 M9xxPower9, 8 & 77042-OE1V8.8.7Power8, 7 & 67042-CR9V8.8.7Power9, 8 & 72.4 GHz16 GB.5 TB or 1 TB4617042-CR9V8.8.7Power8, 7 & 67042-CR9V8.8.6Power8, 7 & 67042-CR9V8.8.5Power8, 7 & 67042-CR9V8.8.4Power8, 7 & 67042-CR8V9R1 M9xxPower9, 8 & 72 GHz8 GB500 GB46117042-CR8V8.8.7Power8, 7 & 67042-CR8V8.8.6Power8, 7 & 67042-CR8V8.8.5Power8, 7 & 67042-CR8V8.8.4Power8, 7 & 67042-CR8V8.8.3Power8, 7 & 67042-CR8V8.8.2Power8, 7 &...
Continue reading

Managed SIEM Services: MSIEM SIEMaaS, SECaaS, SOCaaS

managed-siem-secaas-socaa_20190807-211809_1 Managed SIEM SOCaaS SECaaS
Is your SIEM the magic bullet? Many companies are finding their SIEM implementations have provided little return on investment and have not strengthened their security posture to any great degree. Purchasing the best SIEM and endpoint security tools on the market will not magically identify vulnerabilities, make an infrastructure more secure. Every SIEM requires proper implementation and ongoing tuning services to keep up with the constant changing landscape of threats, vulnerabilities and a customer’s own environment. Like any security product, every SIEM requires an experienced technician to configure it correctly, and enough staff must be trained to keep up with the volume of threats and alerts. The number of false positives and lack of discernable actionable alerts (false positives) a SIEM produces, is a direct result of the implementation, alert maintenance and tuning. Security threats are escalating in sophistication, volume and severity at a rate most companies cannot keep up with. Millions of new threats are discovered each day and requires a dedicated security team to monitor and manage. An experienced Managed SIEM Service or SOC team knows to keep a log of all these security events from threat intelligence feeds, so rules can trigger accurate alerts based on current and past content. Threat intelligence feeds provide the security intelligence, data enrichment and logic needed to maintain a healthy SOC. A Managed SIEM that does not utilize fresh threat intelligence feeds for security AI, may as well not exist. Contact us for Managed SIEM pricing on QRadar AlienVault, Splunk or Exabeam, and view demo of how an advanced SOC implementation can minimize the risks and threats in your environment. Like therapy, the first step is to be honest with yourself. Is your SIEM delivering the results you were promised, and with the efficiency seen during your sales demonstration? Are SIEM operators keeping up with all the alerts? If you answered “no”, your company should consider hiring qualified security experts to go over your SIEM setup and deployed rules. It is probably wise advice not to consider using the same individuals that originally implemented your SIEM or those responsible for the ongoing maintenance and health of your SIEM....
Continue reading

IBM i Encryption for Data Protection and Privacy Compliance

ibm-i-data-protection IBM i Encryption Data Protection
It has only been a year, and the new data protection and privacy regulations have already hit a few companies with multi-million dollar fines. Every company with sensitive data on an IBM i (iSeries AS400) and has data protection and privacy requirements, should have implemented DB2 encryption already. Some of the companies seen in the news recently not only failed to secure personal data properly, could not accurately assess how much data was compromised, had a lax incident response plan and were slow to notify authorities. These factors all led to heavier fines, causing the total financial penalties to exceed 100s of millions dollars. The latest data security and privacy regulations like GDPR, PCI and NYCRR 500 extend globally, and have some pretty sharp teeth. GDPR’s data protection and privacy safeguards have garnered such high praise, most federal, state and local governments like California are modeling their new laws after it. These new data protection and privacy laws have put a lot of overdue responsibility on companies to take better care of our personal data. There are several aspects of the new data security and privacy laws that will affect how much a company will be fined, and will vary on the compliance regulation. So far, GDPR appears to be the strictest and has the costliest consequences with a maximum fine equal to 4% of a company’s revenue. The number of records exposed will be a significant factor when determining a fine, but even more importantly will be the extent and measure of data protections the company implemented to protect personal data. Put simply, companies better due their due diligence to secure personal data. The company fines that incurred the heaviest fines thus far, were incidents that involved unencrypted records. On the IBM i, DB2 database encryption is the most important data protection mechanism for data security and privacy compliance. Here is why. Regardless of how the data is accessed, used or where the data ends up, DB2 database encryption for IBM i provides data security and privacy protection from both internal and external threats. No other security access control mechanism provides this...
Continue reading

Why Nutanix HCI is the ideal VM platform for Splunk SIEM

Nutanix-Product-Shot-3 Why Nutanix HCI is the ideal VM platform for Splunk SIEM
Most SIEM environments rely on a plethora of different servers, storage arrays, hypervisors and network interconnects to support their rapidly growing SOC environments. Likewise, most SIEMs also all have the same issues and concerns about performance, costs and time required to provision and manage storage growth. The primary problem is, the entire infrastructure the SIEM relies on is not integrated or even truly virtualized under a single unified architecture. As a result, administrators are stuck in a never ending battle of upgrading and adding more traditional technology for the same problems, and security analysts are constantly waiting for searches to complete until more resources are made available. The definition of “crazy” comes to mind. The solution? A hyperconverged infrastructure! You should consider and investigate all players in the HCI market place, but this article will be focusing on the proven leader, Nutanix. The Nutanix HCI for Enterprise Cloud can provide SIEM security analysts many times faster search results and administrators with a more scalable and economical infrastructure to grow a SIEM with minimal capex expenses. All SIEM deployments have three key bottlenecks to constantly monitor that affect event log ingestion, searching and retention. This article will explain the advantages of using Nutanix HCI Enterprise Cloud for Splunk, and addresses the common performance and cost issues that affect all SIEMs. Nutanix virtualizes all aspects of the hardware, delivering the most efficient use of all system resources that other VM solutions cannot provide for Splunk SIEM environments. The Nutanix HCI solution has a distributed architecture that shares all infrastructure resources and prevents any workload from depleting another node’s resources. It does not need or rely on expensive SAN, NAS storage, RAID groups or network switches. Nutanix Distributed Storage Fabric enables SIEM indexers and collectors to process data locally, monitors data access paths and places data in the optimal location and automatically moves hot, warm, cold and frozen data to the appropriate internal and external storage resources. The most frequently used data is access from the local node of VM memory and flash, providing maximum performance. Unlike other storage systems that will experience significant I/O bottlenecks,...
Continue reading

IBM i 7.4 Hardware Enhancements for POWER9 and POWER8 Systems

IBM i 7.4 Hardware Enhancements for POWER9 and POWER8 Systems
Details of each POWER9 and POWER8 hardware enhancement provided by the release of IBM 7.4 (V7R4) are below the initial summary, organized by IBM Power generation and topic. The new IBM POWER9 and POWER8 hardware features provided for OS400 V7R4 are now all available for ordering as of June 21, 2019. Read about IBM i 7.4 (V7R4) announcement details here. IBM V7R4 announcement provides the following I/O enhancements for Power9 scale-out and scale-up system models: 1.6 TB, 3.2 TB, and 6.4 TB PCIe3 Enterprise SSD NVMe adapters for Power9 E980, E950, L922, S922, S914, S924, H922, and H924 servers1.6 TB and 3.2 TB Mainstream SSD NVMe U.2 modules for Power9 E980 serverPCIe3 6-Slot Fan-out Module, PCIe x16 to CXP Optical or CU converter Adapter, and Active Optical Cables for PCIe3 Expansion Drawer for Power9 E980, E950, L922, S922, S914, S924, H922, and H924 serversStorage Backplane with HI Performance plus 2x24-Port for Power9 E950 server IBM V7R4 provides the following I/O enhancements for both Power9 and Power8 scale-out and scale-up system models: 931 GB, 1.86 TB, 3.72 TB, and 7.45 TB 2.5-inch Mainstream Solid-State Drives (SSD) for the following IBM Power9 and Power8 System models: E980, E950, L922, S914, S922, S924, H922, H924, S812L, S822L, S824L, S814, S812, S822, S824, E870, E870C, E880, E880C, E850, and E850C servers387 GB, 775 GB, and 1.55 TB 2.5-inch Enterprise Solid-State Drives (SSD) for the following IBM Power9 and Power8 System models: E980, E950, L922, S914, S922, S924, H922, H924, S812L, S822L, S824L, S814, S812, S822, S824, E870, E870C, E880, E880C, E850, and E850C serversDeactivation of LPM for Dedicated Servers for Power E980, E950, S922, S914, and S924 serversIBM i V7R4 Indicator for the following IBM Power9 and Power8 System models: E980, S914, S922, S924, H922, H924, S814, S812, S822, S824, E870, E870C, E880, and E880C servers   Hardware Enhancements for POWER9 provided with V7R4 IBM EC5B and EC5G PCIe3 1.6 TB SSD NVMe AdapterThe IBM EC5B and EC5G PCIe3 1.6 TB SSD NVMe Adapters provide a low write latency and use nonvolatile flash memory (NVMe), which is a high-performance software interface for reading and writing to...
Continue reading

QRadar Prices for All-in-One Hardware SIEM Appliances

QRadar Prices for All-in-One Hardware SIEM Appliances
QRadar Prices for All-in-One SIEM Appliances start at $38,500.00 to $102,000.00. Pricing is calculated based on the volume of events and network flows ingested by the SIEM. QRadar prices for All-in-One appliance includes the following licenses for out of the box deployment: Maximum Events per Second defined by model (expandable increments: 100, 500, 1000, 2500, 20000, 40000, 80000)Maximum Flows per Minute defined by model (expandable increments: 10000, 25000, 50000, 100000, 1200000, 2400000, 3600000)QRadar Security Intelligence Console for SOC including advanced threat protection, predefined dashboards, partner provided and editableIBM Security AI Sense Analytics for assets on premise, mobile, remote sites and cloud servicesAsset and device auto discoveryUser Behavior Analytics and Anomaly DetectionNetwork Scanning, Behavior Analytics and Anomaly DetectionVulnerability Manager for 256 devices with IP address with unlimited scans (expandable). Use of customer provided 3rd party scanner is free.Predictive threat modeling, simulation and impact analysisRisk Manager for 256 devices (expandable increments: 100, 250, 500, 1000, 2500, 5000)xForce IP Reputation FeedAccess to over 100 apps on IBM xForce Exchange with real-time cybersecurity threat and vulnerability updates  All QRadar Security Intelligence offerings, can flexibly grow and scale by simply adding an additional appliance for workload specific requirements, or use a hybrid of software licenses running on customer provided virtual machines and the cloud. QRadar pricing for the different product lines is significantly different. For instance, IBM’s SIEM SaaS QRadar on Cloud offering has zero upfront costs, providing a simple pay as you go solution. Customers may alternatively deploy QRadar in a private or public Cloud service from Amazon AWS, Microsoft Azure or like provider. Fully managed SIEM Security Services MSIEM is provided by the IBM SOC team. QRadar prices for All-in-One Appliances are pre-configured with OS and all required software entitlements needed and are performance tested on Lenovo X-Series Appliance with full support by IBM. Simply power it on. Volume based pricing is determined by the number of events being ingested by QRadar SIEM for additional workloads. First year 24x7 software and 9x5 hardware Maintenance Support is included with initial appliance sale.   QRadar Price(IBM SRP) QRadar Product Part Number $38,500.00 IBM QRadar 3105 All-in-One Appliance...
Continue reading

IBM i 7.4 (V7R4) Details: Everything you need to know

IBM i 7.4 (V7R4) Details: Everything you need to know
IBM i V7R4 (7.4) OS400 enhancements and additions improve Power9 and Power8 system and DB2 database performance, security and availability. Details of OS400 V7R4 features and specifications for IBM i Power Systems are explained below in detail, and arranged by the following topics: Security, System Management, Networking, Availability, Application development, Miscellaneous features. IBM i V7R4 (7.1) release date is June 21, 2019. OS400 V7R4 is supported on IBM Power9 and Power8 processor systems, and is not supported on earlier IBM Power system processor generations. All IBM i customers should read the IBM 7.4 memo before upgrading to ensure compatibility and verify if discontinued support of any software, hardware products or features affects your system. IBM V7R4 hardware enhancement details can be read about here. IBM i SecurityIBM i Authority Collection A significant advancement for IBM i security is the new Authority Collection service feature, capable of analyzing object authorities of users and applications to ensure only the minimum required authorities are granted to run applications. By securing objects in an application with minimum authority required, security administrators can now safely remove unnecessary user authorities to objects used by an application. Most IBM i applications have excessive authorities granted to objects within the application. For instance, when an application gives *PUBLIC *CHANGE or *ALL authority for objects within an application, and accessing a DB2 file, when it only requires *USE authority to the data. Applications with unnecessary authorities creates security vulnerabilities by allowing users and other applications to make changes to data outside the application.   Authority Collection service captures data associated with the runtime authority checking built into IBM i security of OS400. The authority data collected is stored in a repository for displaying and analyzing the data and determine the minimum authority required to the objects the application need to run successfully. Minimum authority should be granted to objects as a best security practices require to protect against unauthorized access from outside the application.  IBM i 7.4 Authority Collection service also allows the collection of authority information for specific objects when accessed by any user, instead of for all objects accessed by a specific user....
Continue reading

QRadar vs Splunk SIEM What You Need To Know BEFORE switching in 2019

QRadar vs Splunk SIEM What You Need To Know BEFORE switching in 2019
This QRadar vs Splunk comparison will help anyone planning on switching in 2019 from Splunk to QRadar SIEM. It will also help anyone just curious to see the additional functionality QRadar has in comparison to Splunk. First Get the FREE Splunk to QRadar SIEM App! You should check out the free Splunk to QRadar SIEM App that enables forwarding of Spl...
Continue reading

By accepting you will be accessing a service provided by a third-party external to https://www.midlandinfosys.com/